[1]Maleh Y,Ezzati A. A review of security attacks and intrusion detection schemes in wireless sensor networks[J].International Journal of Wireless & Mobile Networks,2013,5(6):1-12.
[2]Salvato M,De Vito S,Guerra S,et al.An adaptive immune based anomaly detection algorithm for smart WSN deployments[C]Proc of∥2015 XVIII AISEM Annual Conference,2015:1-5.
[3]Dasgupta D,Yu Sen-hua,Nino F.Recent advances in artificial immune systems: Models and applications[J].Applied Soft Computing,2011,11(2):1574-1587.
[4]Drozda M,Schildt S,Schaust S,et al. Is AIS based misbehavior detection suitable for wireless sensor networks?[C]∥Proc of Wireless Communications and Networking Conference,2007:3128-3133.
[5]Zhang Nan, Zhang Jian-hua,Chen Jian-ying.An intrusion detection mechanism based on immune multi-agents in WSN [J].Computer Engineering & Science,2010,32(5):10-14.(in Chinese)
[6]Liu Ning,Zhao Jian-hua.Applying immune theory to intrusion detection system for wireless sensor network [J].Computer Engineering and Applications,2011,47(15):80-82.(in Chinese)
[7]Fu Rong-rong,Zheng Kang-feng,Lu Tian-liang,et al.Danger theory inspired intrusion detection model for wireless sensor networks[J].Journal on Communications,2012,33(9):31-37.(in Chinese)
[8]Shaukat H R,Hashim F,Sali A. Danger theory based node replication attacks detection in mobile wireless sensor network[C]∥Proc of IEEE Symposium on Computer Applications & Industrial Electronics(ISCAIE), 2014:18-23.
[9]Sun Li-min.Wireless sensor network[M].Beijing:Tsinghua University Press,2005.(in Chinese)
[10]Jin Zhang-zan,Liao Ming-hong,Xiao Gang.Survey of negative selection algorithms[J].Journal on Communications,2013,34(1):159-170.(in Chinese)
[11]Gonzalez F,Dasgupta D. Anomaly detection using real-valued negative selection[J].Genetic Programming and Evolvable Machines,2003,4(4):383-403.
附中文参考文献:
[5]张楠,张建华,陈建英.WSN中基于免疫Multi-Agent的入侵检测机制[J].计算机工程与科学,2010,32(5):10-14.
[6]刘宁,赵建华.应用免疫原理的无线传感器网络入侵检测系统[J].计算机工程与应用,2011,47(15):80-82.
[7]傅蓉蓉,郑康锋,芦天亮,等.基于危险理论的无线传感器网络入侵检测模型[J].通信学报,2012,33(9):31-37.
[9]孙利民.无线传感器网络[M].北京:清华大学出版社,2005.
[10]金章赞,廖明宏,肖刚.否定选择算法综述[J].通信学报,2013,34(1):159-170. |