메뉴 건너뛰기




Volumn , Issue , 2007, Pages 115-120

Distributed and control theoretic approach to intrusion detection

Author keywords

Hidden markov models; IDS; Intrusion detection; Wireless ad hoc networks

Indexed keywords

AD HOC NETWORKS; CONTROL SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; FEEDBACK CONTROL; HIDDEN MARKOV MODELS;

EID: 36849047252     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280940.1280965     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 33746368833 scopus 로고    scopus 로고
    • Self-regulating network utilization in mobile ad-hoc wireless networks
    • July
    • S. Ci, M. Guizani, H. H. Chen, and H. Sharif, "Self-regulating network utilization in mobile ad-hoc wireless networks," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1302-1310, July 2006.
    • (2006) IEEE Trans. Veh. Technol , vol.55 , Issue.4 , pp. 1302-1310
    • Ci, S.1    Guizani, M.2    Chen, H.H.3    Sharif, H.4
  • 2
    • 50949103638 scopus 로고    scopus 로고
    • A secure routing protocol for heterogeneous sensor networks
    • Nov, San Francisco, CA
    • X. Du, Y. Xiao, S. Guizani, and H. H. Chen, "A secure routing protocol for heterogeneous sensor networks, in Proc. IEEE Globecom '06, Nov. 2006, San Francisco, CA.
    • (2006) Proc. IEEE Globecom '06
    • Du, X.1    Xiao, Y.2    Guizani, S.3    Chen, H.H.4
  • 3
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb
    • L.R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, pp. 257-286, Feb. 1989.
    • (1989) Proceedings of the IEEE , vol.77 , pp. 257-286
    • Rabiner, L.R.1
  • 5
    • 77953783421 scopus 로고    scopus 로고
    • Investigating hidden Markov models capabilities in anomaly detection
    • Kennesaw, GA, Mar
    • S. S. Joshi and V. V. Phoha, "Investigating hidden Markov models capabilities in anomaly detection," in Proc. 43rd Annual Southeast Regional Conf. (ACM-SE43), Kennesaw, GA, Mar. 2005, pp. 98-103.
    • (2005) Proc. 43rd Annual Southeast Regional Conf. (ACM-SE43) , pp. 98-103
    • Joshi, S.S.1    Phoha, V.V.2
  • 9
    • 35048846516 scopus 로고    scopus 로고
    • Behavioral Intrusion Detection
    • S. Zanero, "Behavioral Intrusion Detection," in In ISCIS 2004, 2004.
    • (2004) In ISCIS 2004
    • Zanero, S.1
  • 12
    • 0030126609 scopus 로고    scopus 로고
    • Learning in the presence of concept drifting and hidden contexts
    • G. Widmer and M. Kubat, "Learning in the presence of concept drifting and hidden contexts," Machine Learning, vol. 23, pp. 69-101, 1996.
    • (1996) Machine Learning , vol.23 , pp. 69-101
    • Widmer, G.1    Kubat, M.2
  • 13
    • 12244286335 scopus 로고    scopus 로고
    • Systematic data selection to mine concept-drifting data streams
    • W. Fan, "Systematic data selection to mine concept-drifting data streams," ACM SIGKDD, 2004.
    • (2004) ACM SIGKDD
    • Fan, W.1
  • 16
    • 0030287048 scopus 로고    scopus 로고
    • The expectation-maximization algorithm
    • Nov
    • T. K. Moon, "The expectation-maximization algorithm," IEEE Signal Processing Magazine, pp. 47-59, Nov. 1996.
    • (1996) IEEE Signal Processing Magazine , pp. 47-59
    • Moon, T.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.