메뉴 건너뛰기




Volumn 1, Issue 4, 2014, Pages 337-348

Information fusion to defend intentional attack in Internet of things

Author keywords

Attack and defense; connectivity; cyber physical system (CPS); machine to machine (M2M) communications; network vulnerability; zero sum game

Indexed keywords

EMBEDDED SYSTEMS; GAME THEORY; INTERNET; NETWORK SECURITY; SOLVENTS;

EID: 84914816062     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2337018     Document Type: Article
Times cited : (78)

References (63)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 78650921155 scopus 로고    scopus 로고
    • From today's INTRAnet of things to a future INTERnet of Things: A wireless-and mobilityrelated view
    • Dec
    • M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's INTRAnet of things to a future INTERnet of Things: A wireless-and mobilityrelated view, " IEEE Wireless Commun. Mag., vol. 17, no. 6, pp. 44-51, Dec. 2010.
    • (2010) IEEE Wireless Commun. Mag. , vol.17 , Issue.6 , pp. 44-51
    • Zorzi, M.1    Gluhak, A.2    Lange, S.3    Bassi, A.4
  • 3
    • 79953792812 scopus 로고    scopus 로고
    • Toward intelligent machine-to-machine communications in smart grid
    • Apr
    • Z. Fadlullah et al., "Toward intelligent machine-to-machine communications in smart grid, " IEEE Commun. Mag., vol. 49, no. 4, pp. 60-65, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 60-65
    • Fadlullah, Z.1
  • 5
    • 79953778099 scopus 로고    scopus 로고
    • Home M2M networks: Architectures, standards, and QoS improvement
    • Apr
    • Y. Zhang et al., "Home M2M networks: Architectures, standards, and QoS improvement, " IEEE Commun. Mag., vol. 49, no. 4, pp. 44-52, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 44-52
    • Zhang, Y.1
  • 6
    • 79953793010 scopus 로고    scopus 로고
    • Toward ubiquitous massive accesses in 3GPP machine-to-machine communications
    • Apr
    • S.-Y. Lien, K.-C. Chen, and Y. Lin, "Toward ubiquitous massive accesses in 3GPP machine-to-machine communications, " IEEE Commun. Mag., vol. 49, no. 4, pp. 66-74, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 66-74
    • Lien, S.-Y.1    Chen, K.-C.2    Lin, Y.3
  • 7
    • 84899514248 scopus 로고    scopus 로고
    • Machine-to-machine communications: Technologies and challenges
    • Jul.
    • K.-C. Chen and S.-Y. Lien, "Machine-to-machine communications: Technologies and challenges, " Ad Hoc Netw., vol. 18, pp. 3-23, Jul. 2014.
    • (2014) Ad Hoc Netw. , vol.18 , pp. 3-23
    • Chen, K.-C.1    Lien, S.-Y.2
  • 8
    • 84923122221 scopus 로고    scopus 로고
    • Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems
    • Apr
    • I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems, " IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.2 , pp. 122-128
    • Stojmenovic, I.1
  • 10
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things-New security and privacy challenges
    • R. H.Weber, "Internet of Things-New security and privacy challenges, " Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, 2010.
    • (2010) Comput. Law Security Rev. , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 11
    • 84864628159 scopus 로고    scopus 로고
    • Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness
    • O. Yagan, D. Qian, J. Zhang, and D. Cochran, "Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness, " IEEE Trans. Parallel Distrib. Syst., vol. 23, pp. 1708-1720, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , pp. 1708-1720
    • Yagan, O.1    Qian, D.2    Zhang, J.3    Cochran, D.4
  • 12
    • 84864868854 scopus 로고    scopus 로고
    • Smart attacks in smart grid communication networks
    • Aug
    • P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Smart attacks in smart grid communication networks, " IEEE Commun. Mag., vol. 50, no. 8, pp. 24-29, Aug. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.8 , pp. 24-29
    • Chen, P.-Y.1    Cheng, S.-M.2    Chen, K.-C.3
  • 13
    • 84919978090 scopus 로고    scopus 로고
    • Securing the internet of things: A standardization perspective
    • S. Keoh, S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective, " IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.3 , pp. 265-275
    • Keoh, S.1    Kumar, S.2    Tschofenig, H.3
  • 15
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • Jun.
    • D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks, " Nature, vol. 393, no. 6684, pp. 440-442, Jun. 1998.
    • (1998) Nature , vol.393 , Issue.6684 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 16
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Oct.
    • A.-L. Barabási and R. Albert, "Emergence of scaling in random networks, " Science, vol. 286, no. 5439, pp. 509-512, Oct. 1999.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.-L.1    Albert, R.2
  • 17
    • 0036013593 scopus 로고    scopus 로고
    • Statistical mechanics of complex networks
    • Jan.
    • R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks, " Rev. Modern Phys., vol. 74, no. 1, pp. 47-97, Jan. 2002.
    • (2002) Rev. Modern Phys. , vol.74 , Issue.1 , pp. 47-97
    • Albert, R.1    Barabási, A.-L.2
  • 18
    • 0038718854 scopus 로고    scopus 로고
    • The structure and function of complex networks
    • Mar.
    • M. E. J. Newman, "The structure and function of complex networks, " SIAM Rev., vol. 45, no. 2, pp. 167-256, Mar. 2003.
    • (2003) SIAM Rev. , vol.45 , Issue.2 , pp. 167-256
    • Newman, M.E.J.1
  • 19
    • 29844458140 scopus 로고    scopus 로고
    • Understanding Internet topology: Principles, models, and validation
    • Dec.
    • D. Alderson, L. Li, W. Willinger, and J. Doyle, "Understanding Internet topology: Principles, models, and validation, " IEEE/ACM Trans. Netw., vol. 13, no. 6, pp. 1205-1218, Dec. 2005.
    • (2005) IEEE/ACM Trans. Netw. , vol.13 , Issue.6 , pp. 1205-1218
    • Alderson, D.1    Li, L.2    Willinger, W.3    Doyle, J.4
  • 20
    • 34547816608 scopus 로고    scopus 로고
    • The architecture of complexity
    • Aug.
    • A.-L. Barabási, "The architecture of complexity, " IEEE Control Syst. Mag., ivol. 27, no. 4, pp. 33-42, Aug. 2007.
    • (2007) IEEE Control Syst. Mag. , vol.27 , Issue.4 , pp. 33-42
    • Barabási, A.-L.1
  • 21
    • 77956281328 scopus 로고    scopus 로고
    • Complex networks: An engineering view
    • L. Cui, S. Kumara, and R. Albert, "Complex networks: An engineering view, " IEEE Circuits Syst. Mag., vol. 10, no. 3, pp. 10-25, 2010.
    • (2010) IEEE Circuits Syst. Mag. , vol.10 , Issue.3 , pp. 10-25
    • Cui, L.1    Kumara, S.2    Albert, R.3
  • 22
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Jul.
    • R. Albert, H. Jeong, and A.-L. Barabási, "Error and attack tolerance of complex networks, " Nature, vol. 406, no. 6794, pp. 378-382, Jul. 2000.
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.-L.3
  • 23
    • 39449115370 scopus 로고    scopus 로고
    • Tolerance of intentional attacks in complex communication networks
    • Feb.
    • S. Xiao, G. Xiao, and T. H. Cheng, "Tolerance of intentional attacks in complex communication networks, " IEEE Commun. Mag., vol. 45, no. 1, pp. 146-152, Feb. 2008.
    • (2008) IEEE Commun. Mag. , vol.45 , Issue.1 , pp. 146-152
    • Xiao, S.1    Xiao, G.2    Cheng, T.H.3
  • 24
    • 84897705146 scopus 로고    scopus 로고
    • Node removal vulnerability of the largest component of a network
    • P.-Y. Chen and A. Hero, "Node removal vulnerability of the largest component of a network, " in Proc. IEEE GlobalSIP, 2013.
    • (2013) Proc. IEEE GlobalSIP
    • Chen, P.-Y.1    Hero, A.2
  • 25
    • 0034323311 scopus 로고    scopus 로고
    • Resilience of the Internet to random breakdowns
    • Nov.
    • R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, "Resilience of the Internet to random breakdowns, " Phys. Rev. Lett., vol. 85, no. 21, pp. 4626-4628, Nov. 2000.
    • (2000) Phys. Rev. Lett. , vol.85 , Issue.21 , pp. 4626-4628
    • Cohen, R.1    Erez, K.2    Ben-Avraham, D.3    Havlin, S.4
  • 27
    • 72449189585 scopus 로고    scopus 로고
    • Resilience analysis of packet-switched communication networks
    • Dec.
    • M. Menth, M. Duelli, R. Martin, and J. Milbrandt, "Resilience analysis of packet-switched communication networks, " IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1950-1963, Dec. 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.6 , pp. 1950-1963
    • Menth, M.1    Duelli, M.2    Martin, R.3    Milbrandt, J.4
  • 28
    • 77953248995 scopus 로고    scopus 로고
    • Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
    • J. P. Sterbenz et al., "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, " Comput. Netw., vol. 54, no. 8, pp. 1245-1265, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.8 , pp. 1245-1265
    • Sterbenz, J.P.1
  • 29
    • 79959999053 scopus 로고    scopus 로고
    • Network resilience: A systematic approach
    • Jul
    • P. Smith et al., "Network resilience: A systematic approach, " IEEE Commun. Mag., vol. 49, no. 7, pp. 88-97, Jul. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.7 , pp. 88-97
    • Smith, P.1
  • 30
    • 4243939794 scopus 로고    scopus 로고
    • Network robustness and fragility: Percolation on random graphs
    • Dec.
    • D. S. Callaway, M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Network robustness and fragility: Percolation on random graphs, " Phys. Rev. Lett., vol. 85, no. 25, pp. 5468-5471, Dec. 2000.
    • (2000) Phys. Rev. Lett. , vol.85 , Issue.25 , pp. 5468-5471
    • Callaway, D.S.1    Newman, M.E.J.2    Strogatz, S.H.3    Watts, D.J.4
  • 33
    • 84863137279 scopus 로고    scopus 로고
    • Intentional attack and fusion-based defense strategy in complex networks
    • P.-Y. Chen and K.-C. Chen, "Intentional attack and fusion-based defense strategy in complex networks, " in Proc. IEEE Globecom, Dec. 2011, pp. 1-5.
    • (2011) Proc. IEEE Globecom, Dec. , pp. 1-5
    • Chen, P.-Y.1    Chen, K.-C.2
  • 34
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May-Jun.
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection, " IEEE Netw., vol. 8, no. 3, pp. 26-41, May-Jun. 1994.
    • (1994) IEEE Netw. , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 35
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Apr.
    • T. Bass, "Intrusion detection systems and multisensor data fusion, " Commun. ACM, vol. 43, no. 4, pp. 99-105, Apr. 2000.
    • (2000) Commun. ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 36
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Aug.
    • A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends, " Comput. Netw., vol. 51, no. 12, pp. 3448-3470, Aug. 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 37
    • 65249118227 scopus 로고    scopus 로고
    • Network anomaly detection and classification via opportunistic sampling
    • Jan.-Feb.
    • G. Androulidakis, V. Chatzigiannakis, and S. Papavassiliou, "Network anomaly detection and classification via opportunistic sampling, " IEEE Netw., vol. 23, no. 1, pp. 6-12, Jan.-Feb. 2009.
    • (2009) IEEE Netw. , vol.23 , Issue.1 , pp. 6-12
    • Androulidakis, G.1    Chatzigiannakis, V.2    Papavassiliou, S.3
  • 38
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • Apr
    • G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic, " IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 512-525, Apr. 2011.
    • (2011) IEEE/ACM Trans. Netw. , vol.19 , Issue.2 , pp. 512-525
    • Thatte, G.1    Mitra, U.2    Heidemann, J.3
  • 40
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Jan
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid, " Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 41
    • 84876156481 scopus 로고    scopus 로고
    • Cyberentity security in the Internet of Things
    • H. Ning, H. Liu, and L. T. Yang, "Cyberentity security in the Internet of Things, " IEEE Comput., vol. 46, no. 4, pp. 46-53, 2013.
    • (2013) IEEE Comput. , vol.46 , Issue.4 , pp. 46-53
    • Ning, H.1    Liu, H.2    Yang, L.T.3
  • 42
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J.-M. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.3
  • 43
    • 78651372721 scopus 로고    scopus 로고
    • Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
    • Feb
    • A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, " IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.2 , pp. 774-786
    • Rawat, A.1    Anand, P.2    Chen, H.3    Varshney, P.4
  • 44
    • 77953686613 scopus 로고    scopus 로고
    • Sybillimit: A nearoptimal social network defense against sybil attacks
    • Jun
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A nearoptimal social network defense against sybil attacks, " IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885-898, Jun. 2010.
    • (2010) IEEE/ACM Trans. Netw. , vol.18 , Issue.3 , pp. 885-898
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 45
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Nov.
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Security, Nov. 2009, pp. 21-32.
    • (2009) Proc. ACM Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 46
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attacks on the smart grid
    • Dec
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 47
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • Jun
    • T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 48
    • 80051801375 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • Quarter
    • K.Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers, " IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, Quarter 2011.
    • (2011) IEEE Commun. Surveys Tuts. , vol.13 , Issue.2 , pp. 245-257
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, S.3
  • 49
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • May-Jun.
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attack and defense strategies, " IEEE Netw., vol. 20, no. 3, pp. 41-47, May-Jun. 2006.
    • (2006) IEEE Netw. , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 50
    • 0035896667 scopus 로고    scopus 로고
    • Breakdown of the Internet under intentional attack
    • Apr.
    • R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, "Breakdown of the Internet under intentional attack, " Phys. Rev. Lett., vol. 86, no. 16, pp. 3682-3685, Apr. 2001.
    • (2001) Phys. Rev. Lett. , vol.86 , Issue.16 , pp. 3682-3685
    • Cohen, R.1    Erez, K.2    Ben-Avraham, D.3    Havlin, S.4
  • 51
    • 38949211589 scopus 로고    scopus 로고
    • Robustness of the European power grids under intentional attack
    • Feb.
    • R. V. Solé, M. Rosas-Casals, B. Corominas-Murtra, and S. Valverde, "Robustness of the European power grids under intentional attack, " Phys. Rev. E, vol. 77, p. 026102, Feb. 2008.
    • (2008) Phys. Rev. e , vol.77 , pp. 026102
    • Solé, R.V.1    Rosas-Casals, M.2    Corominas-Murtra, B.3    Valverde, S.4
  • 52
    • 0001216057 scopus 로고
    • The Laplacian spectrum of graphs
    • Y. Alavi, G. Chartrand, O. Ollermann, and A. Schwenk, Eds. Hoboken, NJ, USA: Wiley
    • B. Mohar, "The Laplacian spectrum of graphs, " in Graph Theory, Combinatorics, and Applications, Y. Alavi, G. Chartrand, O. Ollermann, and A. Schwenk, Eds. Hoboken, NJ, USA: Wiley, 1991, pp. 871-898.
    • (1991) Graph Theory, Combinatorics, and Applications , pp. 871-898
    • Mohar, B.1
  • 53
    • 84883245242 scopus 로고    scopus 로고
    • Percolation theory-based exposure-path prevention for wireless sensor networks coverage in Internet of Things
    • L. Liu, X. Zhang, and H. Ma, "Percolation theory-based exposure-path prevention for wireless sensor networks coverage in Internet of Things, " IEEE Sensors J., vol. 13, no. 10, pp. 3625-3636, 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3625-3636
    • Liu, L.1    Zhang, X.2    Ma, H.3
  • 54
    • 84863021024 scopus 로고    scopus 로고
    • Connectivity of multiple cooperative cognitive radio ad hoc networks
    • W.-C. Ao, S.-M. Cheng, and K.-C. Chen, "Connectivity of multiple cooperative cognitive radio ad hoc networks, " IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 263-270, 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 263-270
    • Ao, W.-C.1    Cheng, S.-M.2    Chen, K.-C.3
  • 55
    • 84990671447 scopus 로고
    • A critical point for random graphs with a given degree sequence
    • Mar.
    • M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence, " Random Struct. Algorithms, vol. 6, pp. 161-179, Mar. 1995.
    • (1995) Random Struct. Algorithms , vol.6 , pp. 161-179
    • Molloy, M.1    Reed, B.2
  • 57
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the Internet topology
    • Oct.
    • M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the Internet topology, " in ACM SIGCOMM, Oct. 1999, pp. 251-262.
    • (1999) ACM SIGCOMM , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 58
    • 0022604939 scopus 로고
    • Optimal data fusion in multiple sensor detection systems
    • Jan.
    • Z. Chair and P. K. Varshney, "Optimal data fusion in multiple sensor detection systems, " IEEE Trans. Aerosp. Electron. Syst., vol. AES-22, no. 1, pp. 98-101, Jan. 1986.
    • (1986) IEEE Trans. Aerosp. Electron. Syst. , vol.22 , Issue.1 , pp. 98-101
    • Chair, Z.1    Varshney, P.K.2
  • 62
    • 0031211090 scopus 로고    scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting, " J. Comput. Syst. Sci., vol. 55, no. 1, pp. 119-139, 1997.
    • (1997) J. Comput. Syst. Sci. , vol.55 , Issue.1 , pp. 119-139
    • Freund, Y.1    Schapire, R.E.2
  • 63
    • 84871023469 scopus 로고    scopus 로고
    • The multiplicative weights update method: A meta-algorithm and applications
    • S. Arora, E. Hazan, and S. Kale, "The multiplicative weights update method: A meta-algorithm and applications, " Theory Comput, vol. 8, no. 6, pp. 121-164, 2012.
    • (2012) Theory Comput , vol.8 , Issue.6 , pp. 121-164
    • Arora, S.1    Hazan, E.2    Kale, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.