2016
DOI: 10.1155/2016/6047023
|View full text |Cite
|
Sign up to set email alerts
|

Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks

Abstract: Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The application of machine learning is reflected not only in the analysis of data but also in the prediction of data. After analyzing and training the known data of multiregion wireless sensor network by machine learning, Zhang predicted the missing attack data in the target region and successfully predicted the trend of security events in unknown regions . In this paper, we used the prediction and optimization unknown data capabilities of machine learning to successfully predict the preparation parameters of LIG based on known data sets.…”
Section: Introductionmentioning
confidence: 99%
“…The application of machine learning is reflected not only in the analysis of data but also in the prediction of data. After analyzing and training the known data of multiregion wireless sensor network by machine learning, Zhang predicted the missing attack data in the target region and successfully predicted the trend of security events in unknown regions . In this paper, we used the prediction and optimization unknown data capabilities of machine learning to successfully predict the preparation parameters of LIG based on known data sets.…”
Section: Introductionmentioning
confidence: 99%
“…The manually extracted features are simple and low-level, which are not robust for the variations of NSS. The shortages of existing algorithms are summarized as follow (He, Zhang, Wang et al , 2016): The existing manually extracted features are from data level, which are the part of external security situations. However, the inner relationships in the network are between the entities of the network.…”
Section: Introductionmentioning
confidence: 99%