메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 2201-2206

A game theoretic approach to efficient mixed strategies for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; OPTIMIZATION; PROBLEM SOLVING; SET THEORY;

EID: 42549156708     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255097     Document Type: Conference Paper
Times cited : (18)

References (19)
  • 1
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • Oct
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: a statistical anomaly approach," IEEE Communications Magazine, 40(10):76-82, Oct. 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 3
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive Intrusion Detection: A Data Mining Approach
    • Kluwer Academic Publishers, Norwell, MA, Dec
    • W. Lee, S.J. Stolfo and K.W. Mok, "Adaptive Intrusion Detection: A Data Mining Approach," Artificial Intelligence Review, 14(6):533-567, Kluwer Academic Publishers, Norwell, MA, Dec. 2000.
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 4
    • 21844462364 scopus 로고    scopus 로고
    • A Classification Framework for Anomaly Detection
    • The MIT Press, Cambridge, MA, April
    • I. Steinwart, D. Hush and C. Scovel, "A Classification Framework for Anomaly Detection," The Journal of Machine Learning Research, 6:211-232, The MIT Press, Cambridge, MA, April 2005.
    • (2005) The Journal of Machine Learning Research , vol.6 , pp. 211-232
    • Steinwart, I.1    Hush, D.2    Scovel, C.3
  • 5
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • Elsevier
    • S.H. Oh and W.S. Lee, "An anomaly intrusion detection method by clustering normal user behavior," Computers & Security, 22(7):596-612, Elsevier, 2003.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 596-612
    • Oh, S.H.1    Lee, W.S.2
  • 7
    • 0010691873 scopus 로고    scopus 로고
    • The many facets of linear programming
    • Springer-Verlag
    • M.J. Todd, "The many facets of linear programming,", Mathametical Programming, Springer-Verlag, 91:417-436, 2002.
    • (2002) Mathametical Programming , vol.91 , pp. 417-436
    • Todd, M.J.1
  • 9
    • 0004260007 scopus 로고
    • The MIT Press, Cambridge, Massachusetts
    • D. Fudenberg and J. Tirole, "Game Theory," The MIT Press, Cambridge, Massachusetts, 1991.
    • (1991) Game Theory
    • Fudenberg, D.1    Tirole, J.2
  • 10
    • 0042474230 scopus 로고    scopus 로고
    • Detecting Network Intrusions via Sampling: A Game Theoretic Approach
    • March-April
    • M. Kodialam and TV. Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," in IEEE INFOCOM 2003, vol. 3, pp. 1880-1889, March-April 2003.
    • (2003) IEEE INFOCOM 2003 , vol.3 , pp. 1880-1889
    • Kodialam, M.1    Lakshman, T.V.2
  • 12
    • 18844454790 scopus 로고    scopus 로고
    • A. Agah, S. K. Das, K. Basu and M. Asadi, Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach, in Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA'04), pp. 343-346, August- September 2004.
    • A. Agah, S. K. Das, K. Basu and M. Asadi, "Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach," in Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA'04), pp. 343-346, August- September 2004.
  • 14
    • 17744372911 scopus 로고    scopus 로고
    • Game Theory Models for IEEE 802.11 DCF in Wireless Ad Hoc Networks
    • March
    • Y. Xiao, X. Shan and Y. Ren, "Game Theory Models for IEEE 802.11 DCF in Wireless Ad Hoc Networks," in IEEE Radio Communications, vol. 43, no. 3, pp. S22-S26, March 2005.
    • (2005) IEEE Radio Communications , vol.43 , Issue.3
    • Xiao, Y.1    Shan, X.2    Ren, Y.3
  • 15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.