메뉴 건너뛰기




Volumn 4, Issue , 2011, Pages 2811-2814

Wireless sensor intrusion detection system based on the theory of evidence

Author keywords

BPN; evidence theory; IDS; Wireless sensor network

Indexed keywords

ABNORMAL DATA; BPN; CLUSTERING RESULTS; COMPREHENSIVE ASSESSMENT; D S EVIDENCE THEORY; DATA FLOW; EVIDENCE THEORIES; FEATURE VALUES; HIGH RELIABILITY; HISTORICAL DATA; HUMAN THINKING; IDS; INTRUSION DETECTION MODELS; INTRUSION DETECTION SYSTEMS; STANDARD DEVIATION; THEORY OF EVIDENCE; WIRELESS SENSOR;

EID: 84860450395     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSNT.2011.6182548     Document Type: Conference Paper
Times cited : (6)

References (9)
  • 2
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Jonsson E, Valdes A, Almgren M, eds. Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004). Heidelberg: Springer-Verlag
    • Wang K, Stolfo SJ. Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M, eds. Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004). LNCS 3224, Heidelberg: Springer-Verlag, 2004. 203-222.
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 3
    • 0038103863 scopus 로고    scopus 로고
    • An anomaly detection method based on fuzzy judgment
    • in Chinese with English abstract
    • Zhang J, Gong J. An anomaly detection method based on fuzzy judgment. Journal of Computer Research and Development,2003,40(6):776-783 (in Chinese with English abstract).
    • (2003) Journal of Computer Research and Development , vol.40 , Issue.6 , pp. 776-783
    • Zhang, J.1    Gong, J.2
  • 4
    • 17944371143 scopus 로고    scopus 로고
    • Fuzzy multi-class support vector machine and application in intrusion detection
    • in Chinese with English abstract)
    • Li KL, Huang HK, Tian SF, Liu ZP, Liu ZQ. Fuzzy multi-class support vector machine and application in intrusion detection. Chinese Journal of Computers, 2005,28(2):274-280 (in Chinese with English abstract).
    • (2005) Chinese Journal of Computers , vol.28 , Issue.2 , pp. 274-280
    • Li, K.L.1    Huang, H.K.2    Tian, S.F.3    Liu, Z.P.4    Liu, Z.Q.5
  • 5
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by lincoln laboratory
    • McHugh J. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by lincoln laboratory. ACM Trans. on Information and System Security, 2000,3(4):262-294.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 6
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by multivalued mapping
    • Dempster A. Upper and lower probabilities induced by multivalued mapping. Annals of Mathematical Statistics, 1967,38(2): 325-339.
    • (1967) Annals of Mathematical Statistics , vol.38 , Issue.2 , pp. 325-339
    • Dempster, A.1
  • 8
    • 84860463735 scopus 로고    scopus 로고
    • Intrusion detection model based on D-S evidence theory
    • Gong Qiong-yao, Ding Hong, Kong Ting.Intrusion detection model based on D-S evidence theory. Computer Engineeringand Applications, 2008,44(18):113-114.
    • (2008) Computer Engineeringand Applications , vol.44 , Issue.18 , pp. 113-114
    • Gong, Q.-Y.1    Ding, H.2    Kong, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.