Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems
Authors
Keywords
-
Journal
IEEE Internet of Things Journal
Volume 9, Issue 16, Pages 14741-14751
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2021-01-23
DOI
10.1109/jiot.2021.3053842
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Fast Defogging Image Recognition Algorithm based on Bilateral Hybrid Filtering
- (2020) Wei Liang et al. ACM Transactions on Multimedia Computing Communications and Applications
- Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment
- (2020) Wei Liang et al. IEEE Internet of Things Journal
- Secure Data Storage and Recovery in Industrial Blockchain Network Environments
- (2020) Wei Liang et al. IEEE Transactions on Industrial Informatics
- Designing collaborative blockchained signature-based intrusion detection in IoT environments
- (2019) Wenjuan Li et al. Future Generation Computer Systems-The International Journal of eScience
- A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things
- (2019) Wei Liang et al. IEEE Transactions on Industrial Informatics
- Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things
- (2019) Ke Zhang et al. IEEE NETWORK
- A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems
- (2019) Bowen Hu et al. IEEE Transactions on Systems Man Cybernetics-Systems
- An intrusion detection algorithm for sensor network based on normalized cut spectral clustering
- (2019) Gaoming Yang et al. PLoS One
- Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics
- (2019) Ke Zhang et al. IEEE Internet of Things Journal
- An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
- (2019) Wei Liang et al. IEEE Transactions on Industrial Informatics
- Deep Reinforcement Learning for Social-Aware Edge Computing and Caching in Urban Informatics
- (2019) Ke Zhang et al. IEEE Transactions on Industrial Informatics
- On-Line Anomaly Detection With High Accuracy
- (2018) Kun Xie et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Conceptual alignment deep neural networks
- (2018) Yinglong Dai et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks
- (2018) Ke Zhang et al. IEEE Internet of Things Journal
- An Adaptive Trajectory Clustering Method Based on Grid and Density in Mobile Pattern Analysis
- (2017) Yingchi Mao et al. SENSORS
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- An enhanced smart card based remote user password authentication scheme
- (2013) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
- (2012) Xiong Li et al. MATHEMATICAL AND COMPUTER MODELLING
- Cumulative Voting Consensus Method for Partitions with Variable Number of Clusters
- (2007) H.G. Ayad et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started