메뉴 건너뛰기




Volumn , Issue , 2008, Pages 592-598

Entropy weight coefficient method for evaluating intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCE; COMPUTER CRIME; ELECTRONIC COMMERCE; ENTROPY; SECURITY OF DATA; SIGNAL DETECTION;

EID: 54049115914     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISECS.2008.107     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 1
    • 54049120458 scopus 로고    scopus 로고
    • J. P. Anderson (1980). Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania.
    • J. P. Anderson (1980). "Computer security threat monitoring and surveillance". Technical report, James P. Anderson Company, Fort Washington, Pennsylvania.
  • 3
    • 3643079262 scopus 로고    scopus 로고
    • A Software Platform for Testing Intrusion Detection Systems
    • Puketza N., Chung M., Olsson R. O., and Mukherjee B. (1997). "A Software Platform for Testing Intrusion Detection Systems". IEEE Software, Vol. 14, No. 5, pp. 43-51.
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.O.3    Mukherjee, B.4
  • 4
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • Durst R, Champion T, Witten B, et al (1999). "Testing and evaluating computer intrusion detection systems". Communications of the ACM, Vol. 42, No. 7, pp. 53-61.
    • (1999) Communications of the ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3
  • 5
    • 38949148591 scopus 로고    scopus 로고
    • Study on Evaluation Techniques of Intrusion Detection Systems
    • in Chinese
    • Dong Xiao-mei, Xiao Ke, Yu Ge (2005). "Study on Evaluation Techniques of Intrusion Detection Systems". Mini-Micro Systems, Vol. 26, No. 4, pp. 568-571 (in Chinese).
    • (2005) Mini-Micro Systems , vol.26 , Issue.4 , pp. 568-571
    • Dong, X.-M.1    Ke, X.2    Ge, Y.3
  • 6
    • 33745271417 scopus 로고    scopus 로고
    • Design and realization of evaluation environment for intrusion detection system
    • in Chinese
    • Cai Zhong-min, Sun Guo-ji, Wei Jun-hu, et al (2002). "Design and realization of evaluation environment for intrusion detection system". Journal of System Simulation, Vol. 14, No. 3, pp. 377-380 (in Chinese).
    • (2002) Journal of System Simulation , vol.14 , Issue.3 , pp. 377-380
    • Cai, Z.-M.1    Sun, G.-J.2    Wei, J.-H.3
  • 8
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA Off-Line intrusion detection evaluation
    • Lippmann R, Haines J, Fried D et al (2000). "The 1999 DARPA Off-Line intrusion detection evaluation". Computer Networks, Vol. 34, No. 4, pp. 579-595.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3
  • 11
    • 33646857044 scopus 로고    scopus 로고
    • Boping Qin, Xianwei zhou, Jun yang et al (2006). Comprehensive Evaluation of Intrusion Detection Systems Based on Fuzzy Methods. Computer Engineering, 32, No. 8, pp. 155-156 (in Chinese)
    • Boping Qin, Xianwei zhou, Jun yang et al (2006). "Comprehensive Evaluation of Intrusion Detection Systems Based on Fuzzy Methods". Computer Engineering, Vol. 32, No. 8, pp. 155-156 (in Chinese)
  • 16
    • 33750264822 scopus 로고    scopus 로고
    • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
    • Hamburg, Germany, September 18-20
    • Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee and Boris Skoric (2006). "Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems". 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Vol. 4189, pp. 527-546.
    • (2006) 11th European Symposium on Research in Computer Security , vol.4189 , pp. 527-546
    • Gu, G.1    Fogla, P.2    Dagon, D.3    Lee, W.4    Skoric, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.