메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Multiple tracking based anomaly detection of mobile nodes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; GLOBAL POSITIONING SYSTEM; HIDDEN MARKOV MODELS; INFORMATION DISSEMINATION; INFORMATION RETRIEVAL; MARKOV PROCESSES;

EID: 33947158846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (8)
  • 1
    • 0013393580 scopus 로고    scopus 로고
    • Location-Based Authentication: Grounding Cyberspace for Better Security
    • ACM Press/Addison-Wesley Publishing Co, pp
    • Dorothy E. Denning and Peter F. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Internet besieged: countering Cyberspace scofflaws, ACM Press/Addison-Wesley Publishing Co., pp. 167-174, 1997.
    • (1997) Internet besieged: Countering Cyberspace scofflaws , pp. 167-174
    • Denning, D.E.1    MacDoran, P.F.2
  • 2
    • 18144362066 scopus 로고    scopus 로고
    • A Location Enabled Wireless Security System
    • Robert A. Malaney, "A Location Enabled Wireless Security System," Globecom 2004, pp. 2196-2200.
    • (2004) Globecom , pp. 2196-2200
    • Malaney, R.A.1
  • 3
    • 85177502067 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Mobicom 2000.
    • S. Marti, T.J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", Mobicom 2000.
  • 4
    • 4143141932 scopus 로고    scopus 로고
    • Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols
    • Fall, Oct, IEEE Press, pp
    • F. Anjum, D. Subhadrabandhu and S. Sarkar, "Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols," In IEEE 58th Vehicular Technology Conference (VTC 2003-Fall) (Oct. 2003), vol. 3, IEEE Press, pp. 2152-2156.
    • (2003) IEEE 58th Vehicular Technology Conference (VTC , vol.3 , pp. 2152-2156
    • Anjum, F.1    Subhadrabandhu, D.2    Sarkar, S.3
  • 5
    • 18144421528 scopus 로고    scopus 로고
    • Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks
    • Bo Sun, Kui Wu, Udo W. Pooch, "Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks," IEEE Globecom 2004, pp.3551-3555.
    • (2004) IEEE Globecom , pp. 3551-3555
    • Sun, B.1    Wu, K.2    Pooch, U.W.3
  • 6
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected application in speech recognition
    • Feb
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected application in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 7
    • 0037278070 scopus 로고    scopus 로고
    • An Efficient Forward-Backward Algorithm for an Explicit Duration Hidden Markov Model
    • Jan
    • S-Z. Yu and H. Kobayashi, "An Efficient Forward-Backward Algorithm for an Explicit Duration Hidden Markov Model," IEEE Signal Processing Letters, vol.10, Issue 1, Jan. 2003, pp. 11-14.
    • (2003) IEEE Signal Processing Letters , vol.10 , Issue.1 , pp. 11-14
    • Yu, S.-Z.1    Kobayashi, H.2
  • 8
    • 0037290753 scopus 로고    scopus 로고
    • A Hidden Semi-Markov Model with Missing Data and Multiple Observation Sequences for Mobility Tracking
    • Feb
    • S-Z. Yu and H. Kobayashi, "A Hidden Semi-Markov Model with Missing Data and Multiple Observation Sequences for Mobility Tracking," Signal Processing, Vol. 83, no. 2, pp 235-250, Feb 2003.
    • (2003) Signal Processing , vol.83 , Issue.2 , pp. 235-250
    • Yu, S.-Z.1    Kobayashi, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.