Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN

被引:0
|
作者
Peng-Shou, Xie [1 ]
Fu, Cheng [1 ]
Feng, Tao [1 ]
Yan, Yan [1 ]
Liang-Lu, Li [1 ]
机构
[1] School of Computer and Communications, Lanzhou University of Technology, 287 Lan-gong-ping Road, Lanzhou,Gansu,730050, China
来源
关键词
D O I
10.6633/IJNS.20201122(6).15
中图分类号
学科分类号
摘要
引用
收藏
页码:1004 / 1014
相关论文
共 50 条
  • [1] CW-kNN: An Efficient kNN-based Model for Imbalanced Dataset Classification
    Xiang, Yi
    Cao, ZhongFeng
    Yao, ShaoWen
    He, Jing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION PROCESSING (ICCIP 2018), 2018, : 7 - 11
  • [2] A Novel Algorithm for Malicious Attack Detection in UWSN
    Ahmed, Muhammad R.
    Aseeris, Mohammed
    Kaiser, M. Shamim
    Zenia, Nusrat Z.
    Chowdhury, Zamshed I.
    2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION COMMUNICATION TECHNOLOGY (ICEEICT 2015), 2015,
  • [3] Node Consistency Consensus Algorithm for Malicious Node Attacks in Internet of Vehicles
    Yang, Changchun
    Zhang, Yang
    Chen, Yourong
    Miao, Kelei
    Ren, Tiaojuan
    Wang, Zhangquan
    Computer Engineering and Applications, 2023, 59 (19) : 229 - 236
  • [4] DoS Attack Detection in Internet-Connected Vehicles
    Soryal, Joseph
    Saadawi, Tarek
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 7 - 13
  • [5] A Blockchain-Powered Malicious Node Detection in Internet of Autonomous Vehicles
    Prathiba, Sahaya Beni
    Murali, Pranav
    Moorthy, Rajalakshmi Shenbaga
    Anandhan, Deepak Kumar
    Selvaraj, Arikumar K.
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 16277 - 16287
  • [6] Malicious Traffic Detection Algorithm for the Internet of Things Based on Temporal Spatial Feature Fusion
    Zhang, Linzhong
    International Journal of Advanced Computer Science and Applications, 2024, 15 (11) : 646 - 656
  • [7] An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack
    Yusof, Ahmad Riza'ain
    Udzir, Nur Izura
    Selamat, Ali
    TRENDS IN APPLIED KNOWLEDGE-BASED SYSTEMS AND DATA SCIENCE, 2016, 9799 : 95 - 102
  • [8] Detection of malicious rank attack nodes in communication network based on windowed frequency shift algorithm
    Yang, Hao
    Xia, Yibo
    Cai, Wen
    Xie, Xin
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (02) : 203 - 219
  • [9] K-core-based attack to the internet: Is it more malicious than degree-based attack?
    Zhao, Jichang
    Wu, Junjie
    Chen, Mingming
    Fang, Zhiwen
    Zhang, Xu
    Xu, Ke
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (03): : 749 - 766
  • [10] K-core-based attack to the internet: Is it more malicious than degree-based attack?
    Jichang Zhao
    Junjie Wu
    Mingming Chen
    Zhiwen Fang
    Xu Zhang
    Ke Xu
    World Wide Web, 2015, 18 : 749 - 766