메뉴 건너뛰기




Volumn 44, Issue 5, 2014, Pages 593-604

Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications

Author keywords

Intrusion detection; security; unmanned air vehicles (UAVs)

Indexed keywords

COMPUTER CRIME; DISTRIBUTED DATABASE SYSTEMS; INTRUSION DETECTION; MULTI AGENT SYSTEMS; NETWORK SECURITY; SPECIFICATIONS; UNMANNED AERIAL VEHICLES (UAV);

EID: 84899500829     PISSN: 21682216     EISSN: 21682232     Source Type: Journal    
DOI: 10.1109/TSMC.2013.2265083     Document Type: Article
Times cited : (192)

References (30)
  • 1
    • 3543059320 scopus 로고    scopus 로고
    • Telecommunications demand and pricing structure: An econometric analysis
    • DOI 10.1023/B:TELS.0000011198.50511.a4
    • M. Aldebert, M. Ivaldi, and C. Roucolle, "Telecommunications demand and pricing structure: An econometric analysis," Telecommun. Syst., vol. 25, nos. 1-2, pp. 89-115, 2004. (Pubitemid 39019049)
    • (2004) Telecommunication Systems , vol.25 , Issue.1-2 , pp. 89-115
    • Aldebert, M.1    Ivaldi, M.2    Roucolle, C.3
  • 6
    • 0042084285 scopus 로고
    • Effect of artificial-intelligence planningprocedures on system reliability
    • Aug.
    • I. R. Chen and F. B. Bastani, "Effect of artificial-intelligence planningprocedures on system reliability," IEEE Trans. Reliab., vol. 40, no. 3, pp. 364-369, Aug. 1991.
    • (1991) IEEE Trans. Reliab. , vol.40 , Issue.3 , pp. 364-369
    • Chen, I.R.1    Bastani, F.B.2
  • 7
    • 0029250814 scopus 로고
    • On the reliability of AI planning software in real-time applications
    • Feb.
    • I. R. Chen, F. B. Bastani, and T. W. Tsao, "On the reliability of AI planning software in real-time applications," IEEE Trans. Knowl. Data Eng., vol. 7, no. 1, pp. 4-13, Feb. 1995.
    • (1995) IEEE Trans. Knowl. Data Eng. , vol.7 , Issue.1 , pp. 4-13
    • Chen, I.R.1    Bastani, F.B.2    Tsao, T.W.3
  • 8
    • 0032121578 scopus 로고    scopus 로고
    • Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
    • I. R. Chen and T. H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Perform. Eval., vol. 33, no. 2, pp. 89-112, 1998.
    • (1998) Perform. Eval. , vol.33 , Issue.2 , pp. 89-112
    • Chen, I.R.1    Hsi, T.H.2
  • 10
    • 78651347601 scopus 로고    scopus 로고
    • Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration
    • G. C. Hadjichristofi, L. A. DaSilva, S. F. Midkiff, U. Lee, and W. D. Sousa, "Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration," Comput. Netw., vol. 55, no. 1, pp. 282-299, 2011.
    • (2011) Comput. Netw. , vol.55 , Issue.1 , pp. 282-299
    • Hadjichristofi, G.C.1    Dasilva, L.A.2    Midkiff, S.F.3    Lee, U.4    Sousa, W.D.5
  • 11
    • 84858397500 scopus 로고    scopus 로고
    • Highly reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme
    • Dec.
    • D.-T. Ho and S. Shimamoto, "Highly reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme," in Proc. Global Commun. Conf. Workshops, Dec. 2011, pp. 1320-1324.
    • (2011) Proc. Global Commun. Conf. Workshops , pp. 1320-1324
    • Ho, D.-T.1    Shimamoto, S.2
  • 12
    • 33845868556 scopus 로고    scopus 로고
    • A survey on real-world implementations of mobile ad-hoc networks
    • DOI 10.1016/j.adhoc.2005.12.003, PII S1570870505001149
    • W. Kiess and M. Mauve, "A survey on real-world implementations of mobile ad-hoc networks," Ad Hoc Netw., vol. 5, no. 3, pp. 324-339, 2007. (Pubitemid 46027750)
    • (2007) Ad Hoc Networks , vol.5 , Issue.3 , pp. 324-339
    • Kiess, W.1    Mauve, M.2
  • 14
    • 79951658804 scopus 로고    scopus 로고
    • Fault-tolerant distributed reconnaissance
    • Nov.
    • A. Lauf and W. Robinson, "Fault-tolerant distributed reconnaissance," in Proc. Military Commun. Conf., Nov. 2010, pp. 1812-1817.
    • (2010) Proc. Military Commun. Conf. , pp. 1812-1817
    • Lauf, A.1    Robinson, W.2
  • 15
    • 72949113634 scopus 로고    scopus 로고
    • A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
    • A. P. Lauf, R. A. Peters, and W. H. Robinson, "A distributed intrusion detection system for resource-constrained devices in ad-hoc networks," Ad Hoc Netw., vol. 8, no. 3, pp. 253-266, 2010.
    • (2010) Ad Hoc Netw. , vol.8 , Issue.3 , pp. 253-266
    • Lauf, A.P.1    Peters, R.A.2    Robinson, W.H.3
  • 17
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • Mar.
    • R. Mitchell and I. R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
    • (2013) IEEE Trans. Rel. , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.R.2
  • 18
    • 21844439715 scopus 로고    scopus 로고
    • Enhancing transport layer capability in HAPS-satellite integrated architecture
    • DOI 10.1007/s11277-005-0751-2
    • C. E. Palazzi, C. Roseti, M. Luglio, M. Gerla, M. Y. Sanadidi, and J. Stepanek, "Enhancing transport layer capability in HAPS-satellite integrated architecture," Wireless Pers. Commun., vol. 32, nos. 3-4, pp. 339-356, 2005. (Pubitemid 40952234)
    • (2005) Wireless Personal Communications , vol.32 , Issue.3-4 , pp. 339-356
    • Palazzi, C.E.1    Roseti, C.2    Luglio, M.3    Gerla, M.4    Sanadidi, M.Y.5    Stepanek, J.6
  • 19
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Oct.
    • P. Porras and P. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th Nat. Inf. Syst. Security Conf., Oct. 1997, pp. 353-365.
    • (1997) Proc. 20th Nat. Inf. Syst. Security Conf. , pp. 353-365
    • Porras, P.1    Neumann, P.2
  • 21
    • 47949132863 scopus 로고    scopus 로고
    • Adaptive Markov game theoretic data fusion approach for cyber network defense
    • Oct.
    • D. Shen, G. Chen, E. Blasch, and G. Tadda, "Adaptive Markov game theoretic data fusion approach for cyber network defense," in Proc. Military Commun. Conf., Oct. 2007, pp. 1-7.
    • (2007) Proc. Military Commun. Conf. , pp. 1-7
    • Shen, D.1    Chen, G.2    Blasch, E.3    Tadda, G.4
  • 22
    • 49349113752 scopus 로고    scopus 로고
    • A game theoretic data fusion aided path planning approach for cooperative UAV ISR
    • Mar.
    • D. Shen, G. Chen, J. Cruz, and E. Blasch, "A game theoretic data fusion aided path planning approach for cooperative UAV ISR," in Proc. Aerosp. Conf., Mar. 2008, pp. 1-9.
    • (2008) Proc. Aerosp. Conf. , pp. 1-9
    • Shen, D.1    Chen, G.2    Cruz, J.3    Blasch, E.4
  • 23
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • Nov.
    • S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744-757, Nov. 2010.
    • (2010) IEEE Trans. Ind. Informat. , vol.6 , Issue.4 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.-Y.3    Park, Y.4    Rhy, H.5
  • 25
    • 35148872201 scopus 로고    scopus 로고
    • The joint airborne network services suite
    • Oct.
    • R. Trafton and S. Pizzi, "The joint airborne network services suite," in Proc. Military Commun. Conf., Oct. 2006, pp. 1-5.
    • (2006) Proc. Military Commun. Conf. , pp. 1-5
    • Trafton, R.1    Pizzi, S.2
  • 26
    • 33847299487 scopus 로고    scopus 로고
    • Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • Dec.
    • C.-H. Tsang and S. Kwong, "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. Int. Conf. Ind. Technol., Dec. 2005, pp. 51-56.
    • (2005) Proc. Int. Conf. Ind. Technol. , pp. 51-56
    • Tsang, C.-H.1    Kwong, S.2
  • 29
    • 58149488760 scopus 로고    scopus 로고
    • Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
    • O. Yilmaz and I. R. Chen, "Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks," Comput. Commun., vol. 32, no. 2, pp. 317-323, 2009.
    • (2009) Comput. Commun. , vol.32 , Issue.2 , pp. 317-323
    • Yilmaz, O.1    Chen, I.R.2
  • 30
    • 0033350703 scopus 로고    scopus 로고
    • Hidden Markov Model based algorithm for online fault diagnosis with partial and imperfect tests
    • J. Ying, T. Kirubarajan, K. Pattipati, and S. Deb, "A hidden Markov model based algorithm for online fault diagnosis with partial and imperfect tests," in Proc. Syst. Readiness Technol. Conf., Aug. 1999, pp. 355-366. (Pubitemid 30515511)
    • (1999) AUTOTESTCON (Proceedings) , pp. 355-366
    • Ying Jie1    Kirubarajan, T.2    Pattipati Krishna, R.3    Deb Somnath4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.