IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Fuzzy genetic algorithm and applications
Fuzzy Sets and Systems
Introduction to Reinforcement Learning
Introduction to Reinforcement Learning
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Soft Computing and Fuzzy Logic
IEEE Software
Intrusion Detection: Systems and Models
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Sensor network-based countersniper system
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Architecture for an Artificial Immune System
Evolutionary Computation
Measuring intrusion detection capability: an information-theoretic approach
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Computational Intelligence: Concepts to Implementations
Computational Intelligence: Concepts to Implementations
Engineering Applications of Artificial Intelligence
A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A Fast Fuzzy Set Intrusion Detection Model
KAM '08 Proceedings of the 2008 International Symposium on Knowledge Acquisition and Modeling
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Information Security Tech. Report
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A detection method for routing attacks of wireless sensor network based on fuzzy C-means clustering
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 3
Reduced complexity intrusion detection in sensor networks using genetic algorithm
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Expert Systems with Applications: An International Journal
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
A reinforcement learning approach for host-based intrusion detection using sequences of system calls
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
Ensemble based sensing anomaly detection in wireless sensor networks
Expert Systems with Applications: An International Journal
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Intrusion detection through learning behavior model
Computer Communications
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks
Expert Systems with Applications: An International Journal
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Information Sciences: an International Journal
Multi-Agent-Based Anomaly Intrusion Detection
Information Security Journal: A Global Perspective
Hi-index | 0.00 |
The deployment of wireless sensor networks and mobile ad-hoc networks in applications such as emergency services, warfare and health monitoring poses the threat of various cyber hazards, intrusions and attacks as a consequence of these networks' openness. Among the most significant research difficulties in such networks safety is intrusion detection, whose target is to distinguish between misuse and abnormal behavior so as to ensure secure, reliable network operations and services. Intrusion detection is best delivered by multi-agent system technologies and advanced computing techniques. To date, diverse soft computing and machine learning techniques in terms of computational intelligence have been utilized to create Intrusion Detection and Prevention Systems (IDPS), yet the literature does not report any state-of-the-art reviews investigating the performance and consequences of such techniques solving wireless environment intrusion recognition issues as they gain entry into cloud computing. The principal contribution of this paper is a review and categorization of existing IDPS schemes in terms of traditional artificial computational intelligence with a multi-agent support. The significance of the techniques and methodologies and their performance and limitations are additionally analyzed in this study, and the limitations are addressed as challenges to obtain a set of requirements for IDPS in establishing a collaborative-based wireless IDPS (Co-WIDPS) architectural design. It amalgamates a fuzzy reinforcement learning knowledge management by creating a far superior technological platform that is far more accurate in detecting attacks. In conclusion, we elaborate on several key future research topics with the potential to accelerate the progress and deployment of computational intelligence based Co-WIDPSs.