메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2256-2261

Survivability analysis of mobile cyber physical systems with voting-based intrusion detection

Author keywords

intrusion detection; mobile cyber physical systems; model based analysis; security attacks; survivability

Indexed keywords

CYBER-PHYSICAL SYSTEMS; EMERGENCY RESPONSE; HUMAN ACTOR; INTRUSION TOLERANCE; MOBILE NODES; MODEL-BASED ANALYSIS; NUMERICAL DATA; OPTIMAL DESIGN; SECURITY ATTACKS; SECURITY FAILURE; SURVIVABILITY;

EID: 80052477688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2011.5982890     Document Type: Conference Paper
Times cited : (11)

References (12)
  • 3
    • 84859722266 scopus 로고    scopus 로고
    • Anomaly detection for discrete sequences: A survey
    • IEEE Transactions on
    • V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection for discrete sequences: A survey. Knowledge and Data Engineering, IEEE Transactions on, 2010. http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.235.
    • (2010) Knowledge and Data Engineering
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 4
    • 77954310491 scopus 로고    scopus 로고
    • Impact of feature reduction on the efficiency of wireless intrusion detection systems
    • K. El-Khatib. Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Transactions on Knowledge and Data Engineering, 21(8):1143-1149, 2010.
    • (2010) IEEE Transactions on Knowledge and Data Engineering , vol.21 , Issue.8 , pp. 1143-1149
    • El-Khatib, K.1
  • 6
  • 7
    • 79959306908 scopus 로고    scopus 로고
    • A hierarchical performance model for intrusion detection in cyber-physical systems
    • Cancun, Mexico, March
    • R. Mitchell and I. Chen. A hierarchical performance model for intrusion detection in cyber-physical systems. In IEEE Wireless Communication and Networking Conference, Cancun, Mexico, March 2011.
    • (2011) IEEE Wireless Communication and Networking Conference
    • Mitchell, R.1    Chen, I.2
  • 11
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • B. Sun, L. Osborne, Y. Xiao, and S. Guizani. Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5):56-63, 2007.
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4
  • 12
    • 42649126015 scopus 로고    scopus 로고
    • Intrusion detection in homogenerous and heterogeneous wireless sensor networks
    • Y. Wang, X. Wang, B. Xie, D. Wang, and D. Agrawal. Intrusion detection in homogenerous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6):698-711, 2008.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.6 , pp. 698-711
    • Wang, Y.1    Wang, X.2    Xie, B.3    Wang, D.4    Agrawal, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.