M. Brownfield, Y. Gupta, and N. Davis, Wireless sensor network denial of sleep attack, Proc. 2005 IEEE workshop on information assurance and security, 2005.

S. D. Dalrymple, Comparison of zigbee replay attacks using a universal software radio peripheral and usb radio, 2014.

A. Mauro, X. Fafoutis, S. Mödersheim, and N. Dragoni, Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs, pp.1-16, 2013.

A. Dubey, V. Jain, and A. Kumar, A survey in energy drain attacks and their countermeasures in wireless sensor networks, Int. J. Eng. Res. Technol, vol.3, issue.2, 2014.

R. Falk and H. Hof, Fighting insomnia: A secure wake-up scheme for wireless sensor networks, 3rd International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE SECURWARE'09, pp.191-196, 2009.

F. Francois, O. H. Abdelrahman, and E. Gelenbe, Impact of signaling storms on energy consumption and latency of lte user equipment, 2015 IEEE 7th Int. Symp. on Cyberspace Safety and Security, pp.1248-1255, 2015.

E. Gelenbe and Y. Murat-kadioglu, Energy life-time of wireless nodes with and without energy harvesting under network attacks, IEEE Int. Conf. on Communications (ICC), pp.20-24, 2018.

Y. W. Law, M. Palaniswami, L. Van-hoesel, J. Doumen, P. Hartel et al., Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, ACM Trans. Sen. Netw, vol.5, issue.1, 2009.

X. Lu, M. Spear, K. Levitt, N. S. Matloff, and S. F. Wu, A synchronization attack and defense in energy-efficient listen-sleep slotted mac protocols, Int. Conf. on Emerging Security Information, Systems and Technologies, p.2, 2008.

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, M. Kandemir et al., The sleep deprivation attack in sensor networks: Analysis and methods of defense, Int. Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006.

F. Stajano and R. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, 7th Int. Workshop Security Protocols, 1999.

E. Y. Vasserman and N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks, IEEE Trans. Mobile Computing, vol.12, issue.2, pp.318-332, 2013.

E. Gelenbe and Y. Yin, Deep Learning with Dense Random Neural Networks, Proc. Int. Conf. on Man-Machine Interactions, pp.3-18, 2017.

Y. Yin and E. Gelenbe, Deep learning in multi-layer architectures of dense nuclei, 2016.

Y. Yin and E. Gelenbe, Single-cell based random neural network for deep learning, Neural Networks (IJCNN), 2017 Int. Joint Conference on, pp.86-93, 2017.

E. Gelenbe and Y. Yin, Deep learning with random neural networks. Neural Networks (IJCNN), 2016 Int. Joint Conference on, pp.1633-1638, 2016.

E. Gelenbe, Learning in the recurrent random neural network, Neural Computation, vol.5, issue.1, pp.154-164, 1993.

E. Gelenbe, Random neural networks with negative and positive signals and product form solution, Neural Computation, vol.1, issue.4, pp.502-510, 1989.

Y. Yin and E. Gelenbe, Nonnegative autoencoder with simplified random neural network. CoRR, 2016.

X. Glorot, A. Bordes, and Y. Bengio, Deep sparse rectifier neural networks, Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00752497

M. Zhang, J. Wu, H. Lin, P. Yuan, and Y. Song, The Application of One-Class Classifier Based on CNN in Image Defect Detection. Procedia Computer Science, vol.114, pp.341-349, 2017.

, HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack, vol.29, p.7, 2014.

K. Fu, T. Kohno, D. Lopresti, E. Mynatt, K. Nahrstedt et al., Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things, 2017.

O. Brun, Y. Yin, Y. Murat-kadioglu, and E. Gelenbe, Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments. submitted to 20th International Conference on Neural Networks, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02062117