메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Detecting coordinated attacks in tactical wireless networks using cooperative signature-based detectors

Author keywords

[No Author keywords available]

Indexed keywords

COOPERATIVE SIGNATURE BASED DETECTORS; DATA SOURCES; SINGLE AUDIT DATA STREAMS; WIRELESS NETWORKS;

EID: 33847407910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2005.1605682     Document Type: Conference Paper
Times cited : (6)

References (8)
  • 1
    • 33847356366 scopus 로고    scopus 로고
    • P. Neng, S. Jajodia, X. S. Wang. Design and Implementation of A Decentralized Prototype System for Detecting Distributed Attacks
    • P. Neng, S. Jajodia, X. S. Wang. Design and Implementation of A Decentralized Prototype System for Detecting Distributed Attacks
  • 3
  • 4
    • 0005977876 scopus 로고    scopus 로고
    • From Delcarative Signatures to Misuse IDS
    • W. Lee, L. Me, and A. Wespi, editors, Proceedings of the RAID International Symposium, of, Davis, CA, October, Springer-Verlag
    • J-P. Pouzol, M. Ducassé. From Delcarative Signatures to Misuse IDS, In W. Lee, L. Me, and A. Wespi, editors, Proceedings of the RAID International Symposium, volume 2212 of LNCS, pages 1 -21, Davis, CA, October 2001. Springer-Verlag.
    • (2001) LNCS , vol.2212 , pp. 1-21
    • Pouzol, J.-P.1    Ducassé, M.2
  • 5
    • 33847397750 scopus 로고    scopus 로고
    • A Formal Approach for Analysis and Testing of Reliable Embedded Systems . Formal Foundations of Embedded Software and Component-Based Software Architectures (FESCA)
    • 9th April
    • A. Guerrouat and H. Richter. A Formal Approach for Analysis and Testing of Reliable Embedded Systems . Formal Foundations of Embedded Software and Component-Based Software Architectures (FESCA), European Joint Conferences on Theory and Practice of Software (ETAPS), 9th April 2005.
    • (2005) European Joint Conferences on Theory and Practice of Software (ETAPS)
    • Guerrouat, A.1    Richter, H.2
  • 6
    • 1542271911 scopus 로고    scopus 로고
    • Decomposition of Boolean Functions Specified by Cubes
    • CS-97-01, University of Waterloo, October 1998 revised
    • J. Brzozowski and T. Luba, Decomposition of Boolean Functions Specified by Cubes, Research Report CS-97-01, University of Waterloo, October 1998 (revised).
    • Research Report
    • Brzozowski, J.1    Luba, T.2
  • 8
    • 84947584002 scopus 로고    scopus 로고
    • Designing a Web of Highly-Configurable Intrusion Detection Sensors
    • Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection RAID, Davis, CA, October
    • G. Vigna, R.A. Kemmerer, and P. Blix "Designing a Web of Highly-Configurable Intrusion Detection Sensors", in Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, October 2001, LNCS 2212, pp. 69-84.
    • (2001) LNCS , vol.2212 , pp. 69-84
    • Vigna, G.1    Kemmerer, R.A.2    Blix, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.