-
1
-
-
49849130570
-
-
Jean Gordon, E. Edward, H. Shortliffe, Rule-Based Expert Systems, Chapter The Dempster-Shafer Theory of Evidence.
-
Jean Gordon, E. Edward, H. Shortliffe, Rule-Based Expert Systems, Chapter The Dempster-Shafer Theory of Evidence.
-
-
-
-
3
-
-
68949175922
-
-
Nong Ye, Mingning Xu, Information fusion for intrusion detection, in: Third International Conference on Information Fusion, vol. 2, July 2000, pp. 17-20.
-
Nong Ye, Mingning Xu, Information fusion for intrusion detection, in: Third International Conference on Information Fusion, vol. 2, July 2000, pp. 17-20.
-
-
-
-
4
-
-
84867339043
-
-
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, in: Proceedings of the IEEE Symposium on Security and Privacy, 2002, pp. 202-215.
-
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, in: Proceedings of the IEEE Symposium on Security and Privacy, 2002, pp. 202-215.
-
-
-
-
5
-
-
49949102369
-
-
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner, State of the practice of intrusion detection technologies, 1999.
-
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner, State of the practice of intrusion detection technologies, 1999.
-
-
-
-
6
-
-
49949084147
-
-
James P. Anderson, Computer security threat monitoring and surveillance, Fort Washington, Pennsylvania, April 1980.
-
James P. Anderson, Computer security threat monitoring and surveillance, Fort Washington, Pennsylvania, April 1980.
-
-
-
-
7
-
-
0036088611
-
-
Daniel J. Burroughs, Linda F. Wilson, George V. Cybenko, Analysis of distributed intrusion detection systems using bayesian methods, in: International Performance Computing and Communication Conference, April 2002.
-
Daniel J. Burroughs, Linda F. Wilson, George V. Cybenko, Analysis of distributed intrusion detection systems using bayesian methods, in: International Performance Computing and Communication Conference, April 2002.
-
-
-
-
8
-
-
1642434224
-
-
Vincent Berk, Robert Gray, George Bakos, Using sensor networks and data fusion for early detection of active worms, in: SPIE Aerosense Conference, vol. 5071, April 2003, pp. 92-104.
-
Vincent Berk, Robert Gray, George Bakos, Using sensor networks and data fusion for early detection of active worms, in: SPIE Aerosense Conference, vol. 5071, April 2003, pp. 92-104.
-
-
-
-
9
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
ACM Press, NY, USA pp. 99-105, April
-
Bass T. Intrusion detection systems and multisensor data fusion. Communications of the ACM 43 (2000), ACM Press, NY, USA pp. 99-105, April
-
(2000)
Communications of the ACM
, vol.43
-
-
Bass, T.1
-
10
-
-
0036828078
-
Using Dempster-Shafer's theory of evidence to combine aspects of information use
-
Ruthven I., and Lalmas M. Using Dempster-Shafer's theory of evidence to combine aspects of information use. J. Int. Inf. Syst. 19 3 (2002) 267-301
-
(2002)
J. Int. Inf. Syst.
, vol.19
, Issue.3
, pp. 267-301
-
-
Ruthven, I.1
Lalmas, M.2
-
11
-
-
49949084518
-
-
D. Yu, D. Frincke, Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory, in: Proceedings of the 43rd annual southeast regional conference, ACM Press, New York, NY, USA, March 2005, pp. 142-147.
-
D. Yu, D. Frincke, Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory, in: Proceedings of the 43rd annual southeast regional conference, ACM Press, New York, NY, USA, March 2005, pp. 142-147.
-
-
-
-
12
-
-
0036051055
-
-
H. Wu, M. Siegel, R. Stiefelhagen, J. Yang, Sensor fusion using Dempster-Shafer theory, in: Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, 2002.
-
H. Wu, M. Siegel, R. Stiefelhagen, J. Yang, Sensor fusion using Dempster-Shafer theory, in: Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, 2002.
-
-
-
-
13
-
-
0037253062
-
The vision of autonomic computing
-
Kephart J.O., and Chess D.M. The vision of autonomic computing. Computer 36 1 (2003) 41-50
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
14
-
-
49949101591
-
-
A. Garg, R. Battiti, R. Cascella, Reputation Management: Experiments on the Robustness of ROCQ, Technical Report DIT-05-087.
-
A. Garg, R. Battiti, R. Cascella, Reputation Management: Experiments on the Robustness of ROCQ, Technical Report DIT-05-087.
-
-
-
-
15
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Valeur F., Vigna G., Kruegel C., and Kemmerer R. A comprehensive approach to intrusion detection alert correlation. IEEE Trans Dependable Secure Comput 1 3 (2004) 146-169
-
(2004)
IEEE Trans Dependable Secure Comput
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
16
-
-
33644696610
-
Cooperative defence against ddos attacks
-
Zhang G., and Parashar M. Cooperative defence against ddos attacks. J Res Pract Inf Technol 38 1 (2006) 69-84
-
(2006)
J Res Pract Inf Technol
, vol.38
, Issue.1
, pp. 69-84
-
-
Zhang, G.1
Parashar, M.2
-
17
-
-
0242696192
-
-
Sonja Buchegger, Jean-Yves, Le Boudec, Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks), in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, June 2002.
-
Sonja Buchegger, Jean-Yves, Le Boudec, Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks), in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, June 2002.
-
-
-
-
18
-
-
49949113042
-
-
Pietro Michiardi, Refik Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks, in: Proceedings of Communications and Multimedia Security Conference, CMS, September 2002.
-
Pietro Michiardi, Refik Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks, in: Proceedings of Communications and Multimedia Security Conference, CMS, September 2002.
-
-
-
-
19
-
-
33746071857
-
Ensemble methods for noise elimination in classification problems
-
Springer-Verlag
-
Verbaeten S., and Van Assche A. Ensemble methods for noise elimination in classification problems. Lecture Notes in Computer Science vol. 2709 (2003), Springer-Verlag
-
(2003)
Lecture Notes in Computer Science
, vol.2709
-
-
Verbaeten, S.1
Van Assche, A.2
-
20
-
-
84944324287
-
-
X. Zeng, T. Martinez. A noise filtering method using neural networks, in: Proceedings of the IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, May 2003, pp. 26-31.
-
X. Zeng, T. Martinez. A noise filtering method using neural networks, in: Proceedings of the IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, May 2003, pp. 26-31.
-
-
-
|