메뉴 건너뛰기




Volumn 2, Issue , 2007, Pages 816-821

Embedded intelligent intrusion detection: A behavior-based approach

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED DEVICE NETWORK; EMBEDDED INTELLIGENT INTRUSION DETECTION; HISTORICAL DISTRIBUTION; TOLERANCE FACTOR;

EID: 35248823271     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINAW.2007.169     Document Type: Conference Paper
Times cited : (8)

References (9)
  • 1
    • 0024012004 scopus 로고    scopus 로고
    • Diffie, W, The first ten years of public-key cryptography, Proceedings of the IEEE 76, Issue 5, May 1988 Pages(s):560 -577
    • Diffie, W, "The first ten years of public-key cryptography", Proceedings of the IEEE Volume 76, Issue 5, May 1988 Pages(s):560 -577
  • 2
  • 3
    • 4344669516 scopus 로고    scopus 로고
    • Shuenn-Shyang wang, Wan-Sheng Ni, An efficient FPGA implementation of advanced encryption standard algorithm, Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2005 International Symposium on, 2, 23-26 May 2004 Page(s):II - 597-600 2
    • Shuenn-Shyang wang, Wan-Sheng Ni, "An efficient FPGA implementation of advanced encryption standard algorithm", Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2005 International Symposium on, Volume 2, 23-26 May 2004 Page(s):II - 597-600 Vol.2
  • 4
    • 3042721109 scopus 로고    scopus 로고
    • The GNU Privacy Handbook
    • The Free Software Foundation
    • "The GNU Privacy Handbook", The Free Software Foundation, 1999
    • (1999)
  • 7
    • 33847144165 scopus 로고    scopus 로고
    • Artificial Intelligence Techniques Applied to Intrusion Detection INDICON
    • 11-13 Dec, Pages
    • Idris, N.B., Shanmugam, B., "Artificial Intelligence Techniques Applied to Intrusion Detection" INDICON, 2005 Annual IEEE 11-13 Dec. 2005 Page(s):52 - 55
    • (2005) 2005 Annual IEEE , pp. 52-55
    • Idris, N.B.1    Shanmugam, B.2
  • 8
    • 6344287668 scopus 로고    scopus 로고
    • Yan Xia, Ren-Fa Li, Ken-Li Li, Intrusion detection using mobile agent in ad-hoc networks, Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on 6, 26-29 Aug. 2004 Page(s):3383 - 3388 6
    • Yan Xia, Ren-Fa Li, Ken-Li Li, "Intrusion detection using mobile agent in ad-hoc networks", Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on Volume 6, 26-29 Aug. 2004 Page(s):3383 - 3388 vol.6
  • 9
    • 85013580992 scopus 로고    scopus 로고
    • Vilaplana, M.A., Goodchild, C., Application of distributed artificial intelligence in autonomous aircraft operations, Digital Avionics Systems, 2001. DASC The 20th Conference 2, 14-18 Oct. 2001 Page(s):7B3/1 - 7B3/14 2
    • Vilaplana, M.A., Goodchild, C., "Application of distributed artificial intelligence in autonomous aircraft operations", Digital Avionics Systems, 2001. DASC The 20th Conference Volume 2, 14-18 Oct. 2001 Page(s):7B3/1 - 7B3/14 vol.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.