메뉴 건너뛰기




Volumn , Issue , 2014, Pages 226-229

Design of complex event-processing IDS in internet of things

Author keywords

CEP; Esper; Internet of Things; Intrusion Detection

Indexed keywords

EMBEDDED SYSTEMS; INTERNET; INTRUSION DETECTION; PERSONAL COMPUTING; TELECOMMUNICATION NETWORKS;

EID: 84900422088     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMTMA.2014.57     Document Type: Conference Paper
Times cited : (91)

References (15)
  • 1
    • 84855339464 scopus 로고    scopus 로고
    • Processing flows of infonnation: Front data stream to complex event processing [J]
    • Cugola G, Margara A. Processing flows of infonnation: Front data stream to complex event processing [J]. ACM Computing Surveys (CSUR), 2012,44(3): 15.
    • (2012) ACM Computing Surveys (CSUR) , vol.44 , Issue.3 , pp. 15
    • Cugola, G.1    Margara, A.2
  • 2
    • 84881186367 scopus 로고    scopus 로고
    • Stream reasoning and complex event processing in etalis[J]
    • Anicic D, Rudolph S, Fodor P, et al. Stream reasoning and complex event processing in etalis[J]. Semantic Web, 2012, 3(4): 397-407.
    • (2012) Semantic Web , vol.3 , Issue.4 , pp. 397-407
    • Anicic, D.1    Rudolph, S.2    Fodor, P.3
  • 6
    • 84867318831 scopus 로고    scopus 로고
    • Research on intrusion detection for the internet of things based on clone selection principle[J]
    • Liu C M, Zhang Y, Chen R, et al. Research on Intrusion Detection for the Internet of Things Based on Clone Selection Principle[J]. Advanced Materials Research, 2012, 562: 1982-1985.
    • (2012) Advanced Materials Research , vol.562 , pp. 1982-1985
    • Liu, C.M.1    Zhang, Y.2    Chen, R.3
  • 7
    • 84879243749 scopus 로고    scopus 로고
    • Cyber-physical-social based security architecture for future internet of things[J]
    • Ning H, Liu H. Cyber-Physical-Social Based Security Architecture for Future Internet of Things[J]. Advanced in Internet of Things, 2012,2(1): 1-7.
    • (2012) Advanced in Internet of Things , vol.2 , Issue.1 , pp. 1-7
    • Ning, H.1    Liu, H.2
  • 11
    • 84885328301 scopus 로고    scopus 로고
    • SVELTE: Real-time intrusion detection in the internet of tliings[J]
    • Raza S, Wallgren L, Voigt T. SVELTE: Real-time Intrusion Detection in the Internet of Tliings[J]. Ad Hoc Networks, 2013.
    • (2013) Ad Hoc Networks
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 12
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection[J]
    • Zhou C V, Leckie C, Karunasekera S. A survey of coordinated attacks and collaborative intrusion detection[J]. Computers & Security, 2010, 29(1): 124-140.
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 13
    • 84888286739 scopus 로고    scopus 로고
    • Network process analysis: An event-based approach to study business network dynamics[J]
    • Halinen A, Tömroos J Å, Elo M. Network process analysis: An event-based approach to study business network dynamics[J]. Industrial Marketing Management, 2013.
    • (2013) Industrial Marketing Management
    • Halinen, A.1    Tömroos, J.A.2    Elo, M.3
  • 15
    • 84884841868 scopus 로고    scopus 로고
    • An event-based platform for collaborative threats detection and monitoring [J]
    • Lodi G, Aniello L, Di Luna G A, et al. An event-based platform for collaborative threats detection and monitoring [J]. Infonnation Systems, 2014, 39: 175-195.
    • (2014) Infonnation Systems , vol.39 , pp. 175-195
    • Lodi, G.1    Aniello, L.2    Di Luna, G.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.