메뉴 건너뛰기




Volumn 12, Issue 1, 2015, Pages 16-30

Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems

Author keywords

[No Author keywords available]

Indexed keywords

CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; SAFETY ENGINEERING; SPECIFICATIONS;

EID: 84921327876     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2312327     Document Type: Article
Times cited : (192)

References (36)
  • 1
    • 84879051898 scopus 로고    scopus 로고
    • Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
    • Jun
    • H. Al-Hamadi and I. R. Chen, "Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks," IEEE Trans. Netw. Service Manage., vol. 10, no. 2, pp. 189-203, Jun. 2013.
    • (2013) IEEE Trans. Netw. Service Manage , vol.10 , Issue.2 , pp. 189-203
    • Al-Hamadi, H.1    Chen, I.R.2
  • 4
    • 80052171869 scopus 로고    scopus 로고
    • Trust-based intrusion detection in wireless sensor networks
    • Jun
    • F. Bao, I. Chen, M. Chang, and J.H. Cho, "Trust-based intrusion detection in wireless sensor networks," in Proc. IEEE Int. Conf. Commun., Jun. 2011, pp. 1-6.
    • (2011) Proc. IEEE Int. Conf. Commun , pp. 1-6
    • Bao, F.1    Chen, I.2    Chang, M.3    Cho, J.H.4
  • 5
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • Jun
    • F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Trans. Netw. Service Manage., vol. 9, no. 2, pp. 169-183, Jun. 2012.
    • (2012) IEEE Trans. Netw. Service Manage , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, I.R.2    Chang, M.3    Cho, J.H.4
  • 6
    • 0037709592 scopus 로고
    • Reliability of systems with fuzzy-failure criterion
    • Anaheim, CA, USA Jan
    • F. B. Bastani, I. R. Chen, and T. W. Tsao, "Reliability of systems with fuzzy-failure criterion," in Proc. Annu. Rel. Maintainability Symp., Anaheim, CA, USA, Jan. 1994, pp. 442-448.
    • (1994) Proc. Annu. Rel. Maintainability Symp , pp. 442-448
    • Bastani, F.B.1    Chen, I.R.2    Tsao, T.W.3
  • 7
    • 79955867639 scopus 로고    scopus 로고
    • A multidimensional critical state analysis for detecting intrusions in scada systems
    • May
    • A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino, and A. Trombetta, "A multidimensional critical state analysis for detecting intrusions in SCADA systems," IEEE Trans. Ind. Inf., vol. 7, no. 2, pp. 179-186, May 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.2 , pp. 179-186
    • Carcano, A.1    Coletta, A.2    Guglielmi, M.3    Masera, M.4    Fovino, I.5    Trombetta, A.6
  • 9
    • 0042084285 scopus 로고
    • Effectof artificial-intelligenceplanningprocedures on system reliability
    • Aug
    • I. R.ChenandF. B. Bastani, "Effectof artificial-intelligenceplanningprocedures on system reliability," IEEE Trans. Rel., vol. 40, no. 3, pp.364-369,Aug.1991.
    • (1991) IEEE Trans. Rel , vol.40 , Issue.3 , pp. 364-369
    • Chenand, I.R.1    Bastani, F.B.2
  • 10
    • 0029250814 scopus 로고
    • On the reliability of ai planning software in real-time applications
    • Feb
    • I. R. Chen, F. B. Bastani, and T. W. Tsao, "On the reliability of AI planning software in real-time applications," IEEE Trans. Knowl. Data Eng., vol. 7, no. 1, pp. 4-13, Feb. 1995.
    • (1995) IEEE Trans. Knowl. Data Eng , vol.7 , Issue.1 , pp. 4-13
    • Chen, I.R.1    Bastani, F.B.2    Tsao, T.W.3
  • 11
    • 0032121578 scopus 로고    scopus 로고
    • Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
    • I. R. Chen and T. H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Perform. Eval., vol. 33, no. 2, pp. 89-112, 1998.
    • (1998) Perform. Eval , vol.33 , Issue.2 , pp. 89-112
    • Chen, I.R.1    Hsi, T.H.2
  • 12
    • 78751676469 scopus 로고    scopus 로고
    • Adaptive fault tolerant qos control algorithms for maximizing system lifetime of query-based wireless sensor networks
    • Mar./Apr
    • I. R. Chen, A. P. Speer, and M. Eltoweissy, "Adaptive fault tolerant QOS control algorithms for maximizing system lifetime of query-based wireless sensor networks," IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 161-176, Mar./Apr. 2011.
    • (2011) IEEE Trans. Dependable Secure Comput , vol.8 , Issue.2 , pp. 161-176
    • Chen, I.R.1    Speer, A.P.2    Eltoweissy, M.3
  • 13
    • 0141858950 scopus 로고    scopus 로고
    • Analysis of replicated data with repair dependency
    • I. R. Chen and D. C. Wang, "Analysis of replicated data with repair dependency," The Comput. J., vol. 39, no. 9, pp. 767-779, 1996.
    • (1996) The Comput. J , vol.39 , Issue.9 , pp. 767-779
    • Chen, I.R.1    Wang, D.C.2
  • 14
    • 0030381055 scopus 로고    scopus 로고
    • Analyzing dynamic voting using petri nets
    • Niagara Falls, Canada, Oct
    • I. R. Chen and D. C. Wang, "Analyzing dynamic voting using petri nets," in Proc. 15th IEEE Symp. Rel. Distrib. Syst., Niagara Falls, Canada, Oct. 1996, pp. 44-53.
    • (1996) Proc. 15th IEEE Symp. Rel. Distrib. Syst , pp. 44-53
    • Chen, I.R.1    Wang, D.C.2
  • 15
    • 0037645949 scopus 로고    scopus 로고
    • Dynamic quota-based admission control with sub-rating in multimedia servers
    • S.-T. Cheng, C.-M. Chen, and I. R. Chen, "Dynamic quota-based admission control with sub-rating in multimedia servers," Multimedia Syst., vol. 8, no. 2, pp. 83-91, 2000.
    • (2000) Multimedia Syst , vol.8 , Issue.2 , pp. 83-91
    • Cheng, S.-T.1    Chen, C.-M.2    Chen, I.R.3
  • 16
    • 0037350733 scopus 로고    scopus 로고
    • Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation
    • S.-T. Cheng, C.-M. Chen, and I. R. Chen, "Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation," Perform. Eval., vol. 52, no. 1, pp. 1-13, 2003.
    • (2003) Perform. Eval , vol.52 , Issue.1 , pp. 1-13
    • Cheng, S.-T.1    Chen, C.-M.2    Chen, I.R.3
  • 18
    • 77949264858 scopus 로고    scopus 로고
    • Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
    • Mar
    • J. H. Cho, I. R. Chen, and P. G. Feng, "Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks," IEEE Trans. Rel., vol. 59, no. 1, pp. 231-241, Mar. 2010.
    • (2010) IEEE Trans. Rel , vol.59 , Issue.1 , pp. 231-241
    • Cho, J.H.1    Chen, I.R.2    Feng, P.G.3
  • 19
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
    • Aug
    • J.-H. Cho, A. Swami, and I.-R. Chen, "Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks," in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 641-650.
    • (2009) Proc. Int. Conf. Comput. Sci. Eng , pp. 641-650
    • Cho, J.-H.1    Swami, A.2    Chen, I.-R.3
  • 20
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • J.-H. Cho, A. Swami, and I. R. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks," J. Netw. Comput. Appl., vol. 35, no. 3, pp. 1001-1012, 2012.
    • (2012) J. Netw. Comput. Appl , vol.35 , Issue.3 , pp. 1001-1012
    • Cho, J.-H.1    Swami, A.2    Chen, I.R.3
  • 22
    • 84902331601 scopus 로고    scopus 로고
    • Formal modeling and analysis of the modbus protocol
    • B. Dutertre, "Formal modeling and analysis of the Modbus protocol," in Proc. Critical Infrastructure Protection, 2007, pp. 189-204.
    • (2007) Proc. Critical Infrastructure Protection , pp. 189-204
    • Dutertre, B.1
  • 23
    • 20844443098 scopus 로고    scopus 로고
    • Performance analysis of location-Aware mobile service proxies for reducing network cost in personal communication systems
    • B. Gu and I. R. Chen, "Performance analysis of location-Aware mobile service proxies for reducing network cost in personal communication systems," ACM Mobile Netw. Appl., vol. 10, no. 4, pp. 453-463, 2005.
    • (2005) ACM Mobile Netw. Appl , vol.10 , Issue.4 , pp. 453-463
    • Gu, B.1    Chen, I.R.2
  • 26
    • 78751620590 scopus 로고    scopus 로고
    • Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
    • Mar
    • Y. Li and I. R. Chen, "Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks," IEEE Trans. Mobile Comput., vol. 10, no. 3, pp. 349-361, Mar. 2011.
    • (2011) IEEE Trans. Mobile Comput , vol.10 , Issue.3 , pp. 349-361
    • Li, Y.1    Chen, I.R.2
  • 27
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • Mar
    • R. Mitchell and I. R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
    • (2013) IEEE Trans. Rel , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.R.2
  • 29
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • P. Porras and P. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th Nat. Inf. Syst. Security Conf., 1997, pp. 353-365.
    • (1997) Proc. 20th Nat. Inf. Syst. Security Conf , pp. 353-365
    • Porras, P.1    Neumann, P.2
  • 31
    • 35048836274 scopus 로고    scopus 로고
    • Activity recognition in the home using simple and ubiquitous sensors
    • A. Ferscha, F. Mattern, Eds., Berlin, Germany Springer
    • E. Tapia, S. Intille, and K. Larson, "Activity recognition in the home using simple and ubiquitous sensors," in Pervasive Computing. "Lecture Notes in Computer Science", vol. 3001, A. Ferscha, F. Mattern, Eds., Berlin, Germany, Springer, 2004, pp. 158-175.
    • (2004) Pervasive Computing. "lecture Notes in Computer Science , vol.3001 , pp. 158-175
    • Tapia, E.1    Intille, S.2    Larson, K.3
  • 32
    • 33847299487 scopus 로고    scopus 로고
    • Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • Dec
    • C.-H. Tsang and S. Kwong, "Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. IEEE Int. Conf. Ind. Tech., Dec. 2005, pp. 51-56.
    • (2005) Proc. IEEE Int. Conf. Ind. Tech , pp. 51-56
    • Tsang, C.-H.1    Kwong, S.2
  • 34
    • 33644780888 scopus 로고    scopus 로고
    • A process-mining framework for the detection of healthcare fraud and abuse
    • W.-S. Yang and S.-Y. Hwang, "A process-mining framework for the detection of healthcare fraud and abuse," Expert Syst. Appl., vol. 31, no. 1, pp. 56-68, 2006.
    • (2006) Expert Syst. Appl , vol.31 , Issue.1 , pp. 56-68
    • Yang, W.-S.1    Hwang, S.-Y.2
  • 35
    • 58149488760 scopus 로고    scopus 로고
    • Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
    • O. Yilmaz and I. R. Chen, "Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks," Comput. Commun., vol. 32, no. 2, pp. 317-323, 2009.
    • (2009) Comput. Commun , vol.32 , Issue.2 , pp. 317-323
    • Yilmaz, O.1    Chen, I.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.