메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2095-2100

A hierarchical performance model for intrusion detection in cyber-physical systems

Author keywords

anomaly detection; CPS; Cyber physical system; intrusion detection; performance analysis; reliability

Indexed keywords

ANOMALY DETECTION; CPS; CYBER-PHYSICAL SYSTEMS; DESIGN TRADEOFF; DETECTION TECHNIQUE; HIERARCHICAL MODEL; MOBILE NODES; NUMERICAL RESULTS; OPTIMAL DESIGN; PERFORMANCE ANALYSIS; PERFORMANCE CHARACTERISTICS; PERFORMANCE MODEL; PHYSICAL INTERPRETATION; POSITIONAL DISCONTINUITY; SECURITY ASSURANCE; SENSING AND ACTUATING;

EID: 79959306908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2011.5779477     Document Type: Conference Paper
Times cited : (19)

References (14)
  • 2
    • 34748841665 scopus 로고    scopus 로고
    • Research directions in requirements engineering
    • DOI 10.1109/FOSE.2007.17, 4221627, FoSE 2007: Future of Software Engineering
    • B. H. C. Cheng and J. M. Atlee, "Research directions in requirements engineering," in Future of Software Engineering, Minneapolis, MN, June 2007, pp. 285-303. (Pubitemid 47484932)
    • (2007) FoSE 2007: Future of Software Engineering , pp. 285-303
    • Cheng, B.H.C.1    Atlee, J.M.2
  • 5
    • 64549083325 scopus 로고    scopus 로고
    • A novel node selection method of bearings-only sensors for target tracking in wireless sensor networks
    • Kunming, Yunnan, China, Jan
    • Y. Han and W. Zhao, "A novel node selection method of bearings-only sensors for target tracking in wireless sensor networks," in 2009 WRI International Conference on Communications and Mobile Computing, vol. 1, Kunming, Yunnan, China, Jan. 2009, pp. 136-140.
    • (2009) 2009 WRI International Conference on Communications and Mobile Computing , vol.1 , pp. 136-140
    • Han, Y.1    Zhao, W.2
  • 6
    • 50249138697 scopus 로고    scopus 로고
    • A simple multi-point surveillance scheme of a moving target for wireless sensor networks
    • Washington, DC, USA, Nov. 2007
    • K. Tsukamoto, H. Ueda, H. Tamura, J. Wang, K. Kawahara, Y. Oie, and T. Suda, "A simple multi-point surveillance scheme of a moving target for wireless sensor networks," in IEEE Globecom 2007 Workshops, Washington, DC, USA, Nov. 2007, pp. 1-8.
    • IEEE Globecom 2007 Workshops , pp. 1-8
    • Tsukamoto, K.1    Ueda, H.2    Tamura, H.3    Wang, J.4    Kawahara, K.5    Oie, Y.6    Suda, T.7
  • 10
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in 5th ACM workshop on Wireless security, Los Angeles, California, 2006, pp. 43-52. (Pubitemid 46634301)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 11
    • 35148882671 scopus 로고    scopus 로고
    • Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems
    • M.-L. Shyu, T. Quirino, Z. Xie, S.-C. Chen, and L. Chang, "Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems," ACM Trans. Auton. Adapt. Syst., vol. 2, no. 3, p. 9, 2007.
    • (2007) ACM Trans. Auton. Adapt. Syst. , vol.2 , Issue.3 , pp. 9
    • Shyu, M.-L.1    Quirino, T.2    Xie, Z.3    Chen, S.-C.4    Chang, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.