[1] |
KIM J , BENTLEY P , AICKELIN U , et al. Immune system approaches to intrusion detection-a review[J]. Natural Computing, 2007,6(4): 413-466.
|
[2] |
YI P , WU Y , CHEN J L . Towards an artificial immune system for detecting anomalies in wireless mesh networks[J]. China Communications, 2011,8(3): 107-117.
|
[3] |
MATZINGER P . Tolerance,danger and the extended family[J]. Annual Review Immunology, 1994,12: 991-1045.
|
[4] |
WU S X , BANZHAF W . The use of computational intelligence in intrusion detection systems:a review[J]. Applied Soft Computing, 2010,10(1): 1-35.
|
[5] |
AICKELIN U , BENTLEY P , CAYZER S , et al. Danger theory:the link between AIS and IDS[A]. Proceedings of the Second International Conference on Artificial Immune Systems[C]. Edinburgh,UK, 2003. 147-155.
|
[6] |
KIM J , BENTLEY P , WALLENTA C , et al. Danger is ubiquitous:detecting malicious activities in sensor networks usin the dendritic cell algorithm[A]. Proceedings of the International Conference o Artificial Immune Systems[C]. Cambridge,UK, 2006. 390-403.
|
[7] |
DROZDA M , SCHAUST S , SZCZERBICKA H . AIS for misbehavior detection in wireless sensor networks:performance and design principles[A]. Proceedings of the IEEE Congress on Evolutionary Computation,Special Session on Recent Developments in Artificial Immune Systems[C]. Singapore, 2007. 3719-3726.
|
[8] |
DROZDA M , SCHAUST S , SCHILDT S , et al. Priming:making the reaction to intrusion or fault predictable[J]. Natural Computing, 2011,10(1): 243-274.
|
[9] |
DROZDA M , SCHILDT S , SCHAUST S , et al. An immuno-inspired approach to misbehavior detection in ad hoc wireless networks[EB/OL]. , 2010.
|
[10] |
MARTI S , GIULI T , LAI K , et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. Proceedings of the International Conference on Mobile Computing and Networking[C]. Massachusetts,USA, 2000. 255-265.
|
[11] |
SCHAUST S , SZCZERBICKA H . Applying antigen-receptor degeneracy behavior for misbehavior response selection in wi less sensor networks[A]. Proceedings of the 10th International Conference on Artificial Immune Systems[C]. Cambridge,UK, 2011. 212-225.
|
[12] |
BALACHANDRAN S , DASGUPTA D , WANG L . A hybrid approach for misbehavior detection in wireless ad-hoc networks[A]. Proceedings of the Symposium on Information Assurance[C]. New York,USA, 2006. 14-15.
|
[13] |
孙利民, 李建中, 陈渝 等. 无线传感器网络[M]. 北京: 清华大学出版社, 2005. SUN LM , LI J Z , CHEN Y , et al. Wireless Sensor Networks[M]. Beijing: Tsinghua University Press, 2005.
|
[14] |
RAO V P , MARANDIN D . Adaptive backoff exponent algorithm for zigbee(IEEE 802.15.4)[A]. Proceedings of 6th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking[C]. St Petersburg,Russia, 2006. 501-516.
|