메뉴 건너뛰기




Volumn 1, Issue , 2011, Pages 212-216

Research on immunity-based intrusion detection technology for the Internet of Things

Author keywords

Artificial immune system; Internet of Things; Intrusion detection; Security of Internet of Things

Indexed keywords

APPLICATION METHOD; ARTIFICIAL IMMUNE SYSTEM; IMMUNE THEORY; INTERNET OF THINGS; INTRUSION DETECTION TECHNOLOGIES; MATURE DETECTORS; SECURITY OF INTERNET OF THINGS; SECURITY THREATS;

EID: 80053388902     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNC.2011.6022060     Document Type: Conference Paper
Times cited : (91)

References (22)
  • 2
    • 80053168731 scopus 로고    scopus 로고
    • A study on the 'Internet of things' and its scientific development in China
    • (in Chinese)
    • Y. Z. Yang and J. H. Gao, "A Study on the 'Internet of Things' and Its Scientific Development in China," China Business and Market, pp. 46-49, 2010 (in Chinese).
    • (2010) China Business and Market , pp. 46-49
    • Yang, Y.Z.1    Gao, J.H.2
  • 4
    • 80053430572 scopus 로고    scopus 로고
    • Internet of people, things and services - The convergence of security, trust and privacy, information security general science
    • December
    • J. H. P, Eloff, M. M. Eloff, M. T. Dlamini and M. P. Zielinski, "Internet of people, things and services - the convergence of security, trust and privacy, Information security General science," engineering & technology, December, 2009.
    • (2009) Engineering & Technology
    • Eloff, P.J.H.1    Eloff, M.M.2    Dlamini, M.T.3    Zielinski, M.P.4
  • 5
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things - New security and privacy challenges
    • R. H. Weber, "Internet of Things - New security and privacy challenges," Computer Law & Security Review, vol. 26, pp. 23-30, 2010.
    • (2010) Computer Law & Security Review , vol.26 , pp. 23-30
    • Weber, R.H.1
  • 12
    • 80053409890 scopus 로고    scopus 로고
    • Security model and key technology on internet of things
    • (in Chinese)
    • Y. B. Liu and W. P. Hu, "Security model and key technology on Internet of Things," Digital Communication, pp.28-33, 2010 (in Chinese).
    • (2010) Digital Communication , pp. 28-33
    • Liu, Y.B.1    Hu, W.P.2
  • 13
    • 24144447453 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry (in Chinese)
    • T. Li, Computer immunology, Beijing: Publishing House of Electronics Industry, 2004(in Chinese).
    • (2004) Computer Immunology
    • Li, T.1
  • 15
    • 0037910212 scopus 로고    scopus 로고
    • Artificial immune system: Principle, models, analysis and perspectives
    • (in Chinese)
    • R. B. Xiao and L. Wang, "Artificial immune system: principle, models, analysis and perspectives," Chinese Journal of Computers, vol. 25, pp. 1281-1293, 2002 (in Chinese).
    • (2002) Chinese Journal of Computers , vol.25 , pp. 1281-1293
    • Xiao, R.B.1    Wang, L.2
  • 16
    • 3142752196 scopus 로고    scopus 로고
    • Development and prospect of the artificial I mmune system
    • (in Chinese)
    • L. C. Jiao and H. F. Du, Development and Prospect of the Artificial I mmune System," Acta Electronica Sinica, vol. 31, pp. 1540-1548, 2003 (in Chinese).
    • (2003) Acta Electronica Sinica , vol.31 , pp. 1540-1548
    • Jiao, L.C.1    Du, H.F.2
  • 17
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection algorithms: Analysis and implications
    • Las Alamitos, CA, USA
    • P. D'haeseleer, S. Forrest and P. Helman, "An immunological approach to change detection algorithms: Analysis and implications," Proc. of IEEE Symposium on Security and Privacy, Las Alamitos, CA, USA, pp. 110-119, 1996.
    • (1996) Proc. of IEEE Symposium on Security and Privacy , pp. 110-119
    • D'Haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 19
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • DOI 10.1109/TEVC.2002.1011541, PII S1089778X02060666
    • D. Dasgupta, "An immunity-based technique to characterize intrusions in computer networks," IEEE Transactions on Evolutionary Computation, vol. 6, pp. 281-291, 2002. (Pubitemid 34867250)
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 22
    • 84901408225 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
    • J. Kim and P. J. Bentley, "Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection," Proc. of the Congress on Evolutionary Computation, pp. 1015-1020, 2002.
    • (2002) Proc. of the Congress on Evolutionary Computation , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.