메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 277-282

Towards an intrusion detection system for pervasive computing environments

Author keywords

Intrusion detection; Mobile agents; Pervasive computing security

Indexed keywords

COMPUTER SCIENCE; DISTRIBUTED COMPUTER SYSTEMS; INTELLIGENT AGENTS;

EID: 24744460284     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.279     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 84976653144 scopus 로고
    • Some computer science problems in ubiquitous computing
    • July
    • M. Weiser, "Some Computer Science Problems in Ubiquitous Computing", Communications of the ACM, Vol. 36, No. 7, pp. 75-84, July 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 4
    • 0035428427 scopus 로고    scopus 로고
    • Pervasive computing: Vision and challenges
    • IEEE Computer press, August
    • M. Satyanarayanan, "Pervasive Computing: Vision and Challenges", IEEE Personal Communications, IEEE Computer press, August 2001.
    • (2001) IEEE Personal Communications
    • Satyanarayanan, M.1
  • 8
    • 7644231825 scopus 로고    scopus 로고
    • A security architecture based on trust management for pervasive computing systems
    • October
    • Lalana Kagal et al., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", Proceedings of Grace Hopper Celebration of Women in Computing, October 2002.
    • (2002) Proceedings of Grace Hopper Celebration of Women in Computing
    • Kagal, L.1
  • 9
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • September
    • Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", ACM Wireless Networks Journal, 9(5): 545-556, September 2003.
    • (2003) ACM Wireless Networks Journal , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 10
    • 0003337684 scopus 로고    scopus 로고
    • A method of tracing intruders by use of mobile agents
    • San Jose, USA, June
    • M. Asaka, S. Okazawa, A. Taguchi, and S. Goto, "A Method of Tracing Intruders by Use of Mobile Agents", INET'99, San Jose, USA, June 1999.
    • (1999) INET'99
    • Asaka, M.1    Okazawa, S.2    Taguchi, A.3    Goto, S.4
  • 19
    • 33749372897 scopus 로고    scopus 로고
    • http://www.ifi.unizh.ch/ ddis/staff/vorburg/doc/Orb/index.htm
    • Recursion Software Inc, "Voyager ORB Developer's Guide", www.objectspace.com, http://www.ifi.unizh.ch/ ddis/staff/vorburg/doc/Orb/index. htm.
    • Voyager ORB Developer's Guide


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.