-
1
-
-
84855339464
-
Processing flows of infonnation: Front data stream to complex event processing [J]
-
Cugola G, Margara A. Processing flows of infonnation: Front data stream to complex event processing [J]. ACM Computing Surveys (CSUR), 2012,44(3): 15.
-
(2012)
ACM Computing Surveys (CSUR)
, vol.44
, Issue.3
, pp. 15
-
-
Cugola, G.1
Margara, A.2
-
2
-
-
84881186367
-
Stream reasoning and complex event processing in etalis[J]
-
Anicic D, Rudolph S, Fodor P, et al. Stream reasoning and complex event processing in etalis[J]. Semantic Web, 2012, 3(4): 397-407.
-
(2012)
Semantic Web
, vol.3
, Issue.4
, pp. 397-407
-
-
Anicic, D.1
Rudolph, S.2
Fodor, P.3
-
5
-
-
84865625980
-
Internet of things[J]
-
Xia F, Yang L T, Wang L, et al. Internet of Things[J]. International Journal of Communication Systems, 2012, 25(9): 1101-1102.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1101-1102
-
-
Xia, F.1
Yang, L.T.2
Wang, L.3
-
6
-
-
84867318831
-
Research on intrusion detection for the internet of things based on clone selection principle[J]
-
Liu C M, Zhang Y, Chen R, et al. Research on Intrusion Detection for the Internet of Things Based on Clone Selection Principle[J]. Advanced Materials Research, 2012, 562: 1982-1985.
-
(2012)
Advanced Materials Research
, vol.562
, pp. 1982-1985
-
-
Liu, C.M.1
Zhang, Y.2
Chen, R.3
-
7
-
-
84879243749
-
Cyber-physical-social based security architecture for future internet of things[J]
-
Ning H, Liu H. Cyber-Physical-Social Based Security Architecture for Future Internet of Things[J]. Advanced in Internet of Things, 2012,2(1): 1-7.
-
(2012)
Advanced in Internet of Things
, vol.2
, Issue.1
, pp. 1-7
-
-
Ning, H.1
Liu, H.2
-
11
-
-
84885328301
-
SVELTE: Real-time intrusion detection in the internet of tliings[J]
-
Raza S, Wallgren L, Voigt T. SVELTE: Real-time Intrusion Detection in the Internet of Tliings[J]. Ad Hoc Networks, 2013.
-
(2013)
Ad Hoc Networks
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
12
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection[J]
-
Zhou C V, Leckie C, Karunasekera S. A survey of coordinated attacks and collaborative intrusion detection[J]. Computers & Security, 2010, 29(1): 124-140.
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
13
-
-
84888286739
-
Network process analysis: An event-based approach to study business network dynamics[J]
-
Halinen A, Tömroos J Å, Elo M. Network process analysis: An event-based approach to study business network dynamics[J]. Industrial Marketing Management, 2013.
-
(2013)
Industrial Marketing Management
-
-
Halinen, A.1
Tömroos, J.A.2
Elo, M.3
-
14
-
-
84900390368
-
-
U.S. Patent 20, 120, 227, 108[P], 2012-9-6
-
Noel S E, Robertson E B, Jajodia S. Intrusion Event Correlation System: U.S. Patent 20, 120, 227, 108[P], 2012-9-6.
-
Intrusion Event Correlation System
-
-
Noel, S.E.1
Robertson, E.B.2
Jajodia, S.3
-
15
-
-
84884841868
-
An event-based platform for collaborative threats detection and monitoring [J]
-
Lodi G, Aniello L, Di Luna G A, et al. An event-based platform for collaborative threats detection and monitoring [J]. Infonnation Systems, 2014, 39: 175-195.
-
(2014)
Infonnation Systems
, vol.39
, pp. 175-195
-
-
Lodi, G.1
Aniello, L.2
Di Luna, G.A.3
|