메뉴 건너뛰기




Volumn 8, Issue 2-3, 2016, Pages 140-164

Dynamic event classification for intrusion and false alarm detection in vehicular ad hoc networks

Author keywords

Ad hoc data classification; Automatic vehicle location; False alarm detection; Intrusion detection; Mining ad hoc networks; Sensor networks

Indexed keywords

ALARM SYSTEMS; ERRORS; INTRUSION DETECTION; SEMANTICS; SENSOR NETWORKS;

EID: 84959333664     PISSN: 14666642     EISSN: 17418070     Source Type: Journal    
DOI: 10.1504/IJICT.2016.074840     Document Type: Article
Times cited : (16)

References (43)
  • 1
    • 77958005519 scopus 로고    scopus 로고
    • ROLEX-SP: Rules of lexical syntactic patterns for free text categorization
    • Al Zamil, M.G. and Can, A.B. (2011) 'ROLEX-SP: rules of lexical syntactic patterns for free text categorization', Knowledge-Based Systems, Vol. 24, No. 1, pp.58-65.
    • (2011) Knowledge-Based Systems , vol.24 , Issue.1 , pp. 58-65
    • Al Zamil, M.G.1    Can, A.B.2
  • 4
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • Bao, F., Chen, R., Chang, M. and Cho, J.H. (2012) 'Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection', Network and Service Management, IEEE Transactions on, Vol. 9, No. 2, pp.169-183.
    • (2012) Network and Service Management, IEEE Transactions on , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, R.2    Chang, M.3    Cho, J.H.4
  • 6
    • 84959430382 scopus 로고    scopus 로고
    • (accessed 25 October 2013)
    • Berlin MOD Collection [online] http://dna.fernuni-hagen.de/secondo/BerlinMOD/BerlinMOD.html (accessed 25 October 2013).
    • Berlin MOD Collection [Online]
  • 7
    • 77949512428 scopus 로고    scopus 로고
    • A distributed intrusion detection system for ad-hoc wireless sensor networks: The AWISSENET distributed intrusion detection system
    • June, IEEE
    • Besson, L. and Leleu, P. (2009) 'A distributed intrusion detection system for ad-hoc wireless sensor networks: the AWISSENET distributed intrusion detection system', Systems, Signals and Image Processing, 2009: IWSSIP 2009, 16th International Conference on, June, pp.1-3, IEEE.
    • (2009) Systems, Signals and Image Processing, 2009: IWSSIP 2009, 16th International Conference on , pp. 1-3
    • Besson, L.1    Leleu, P.2
  • 9
    • 79959520290 scopus 로고    scopus 로고
    • On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks
    • Boppana, R.V. and Su, X. (2011) 'On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks', Mobile Computing, IEEE Transactions on, Vol. 10, No. 8, pp.1162-1174.
    • (2011) Mobile Computing, IEEE Transactions on , vol.10 , Issue.8 , pp. 1162-1174
    • Boppana, R.V.1    Su, X.2
  • 13
    • 71349088077 scopus 로고    scopus 로고
    • Berlin MOD: A benchmark for moving object databases
    • Düntgen, C., Behr, T. and Güting, R.H. (2009) 'Berlin MOD: a benchmark for moving object databases', The VLDB Journal, Vol. 18, No. 6, pp.1335-1368.
    • (2009) The VLDB Journal , vol.18 , Issue.6 , pp. 1335-1368
    • Düntgen, C.1    Behr, T.2    Güting, R.H.3
  • 19
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
    • Hwang, K., Cai, M., Chen, Y. and Qin, M. (2007) 'Hybrid intrusion detection with weighted signature generation over anomalous internet episodes', Dependable and Secure Computing, IEEE Transactions on, Vol. 4, No. 1, pp.41-55.
    • (2007) Dependable and Secure Computing, IEEE Transactions on , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 22
    • 72949113634 scopus 로고    scopus 로고
    • A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
    • Lauf, A.P., Peters, R.A. and Robinson, W.H. (2010) 'A distributed intrusion detection system for resource-constrained devices in ad-hoc networks', Ad Hoc Networks, Vol. 8, No. 3, pp.253-266.
    • (2010) Ad Hoc Networks , vol.8 , Issue.3 , pp. 253-266
    • Lauf, A.P.1    Peters, R.A.2    Robinson, W.H.3
  • 23
    • 84855217006 scopus 로고    scopus 로고
    • A comparative study of data mining algorithms for network intrusion detection in the presence of poor quality data
    • Lauría, E.J. and Tayi, G.K. (2003) 'A comparative study of data mining algorithms for network intrusion detection in the presence of poor quality data', IQ, pp.190-201.
    • (2003) IQ , pp. 190-201
    • Lauría, E.J.1    Tayi, G.K.2
  • 26
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • IEEE
    • Mishra, A., Nadkarni, K. and Patcha, A. (2004) 'Intrusion detection in wireless ad hoc networks', Wireless Communications, Vol. 11, No. 1, pp.48-60, IEEE.
    • (2004) Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 27
    • 84870065075 scopus 로고    scopus 로고
    • Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
    • Mitrokotsa, A. and Dimitrakakis, C. (2013) 'Intrusion detection in MANET using classification algorithms: the effects of cost and model selection', Ad Hoc Networks, Vol. 11, No. 1, pp.226-237.
    • (2013) Ad Hoc Networks , vol.11 , Issue.1 , pp. 226-237
    • Mitrokotsa, A.1    Dimitrakakis, C.2
  • 29
    • 0028429573 scopus 로고
    • Inductive logic programming: Theory and methods
    • Muggleton, S. and De Raedt, L. (1994) 'Inductive logic programming: theory and methods', The Journal of Logic Programming, Vol. 19, No. 1, pp.629-679.
    • (1994) The Journal of Logic Programming , vol.19 , Issue.1 , pp. 629-679
    • Muggleton, S.1    De Raedt, L.2
  • 30
    • 57049093231 scopus 로고    scopus 로고
    • Application of data mining to network intrusion detection: Classifier selection model
    • Springer, Berlin Heidelberg
    • Nguyen, H.A. and Choi, D. (2008) 'Application of data mining to network intrusion detection: classifier selection model', Challenges for Next Generation Network Operations and Service Management, pp.399-408, Springer, Berlin Heidelberg.
    • (2008) Challenges for Next Generation Network Operations and Service Management , pp. 399-408
    • Nguyen, H.A.1    Choi, D.2
  • 35
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • IEEE
    • Sun, B., Osborne, L., Xiao, Y. and Guizani, S. (2007) 'Intrusion detection techniques in mobile ad hoc and wireless sensor networks', Wireless Communications, Vol. 14, No. 5, pp.56-63, IEEE.
    • (2007) Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4
  • 36
    • 84887606769 scopus 로고    scopus 로고
    • Phased searching with NEAT in a time-scaled framework: Experiments on a computer-aided detection system for lung nodules
    • Tan, M., Deklerck, R., Cornelis, J. and Jansen, B. (2013) 'Phased searching with NEAT in a time-scaled framework: experiments on a computer-aided detection system for lung nodules', Artificial Intelligence in Medicine, Vol. 59, No. 3, pp.157-167.
    • (2013) Artificial Intelligence in Medicine , vol.59 , Issue.3 , pp. 157-167
    • Tan, M.1    Deklerck, R.2    Cornelis, J.3    Jansen, B.4
  • 38
    • 0021518106 scopus 로고
    • A theory of the learnable
    • Valiant, L.G. (1984) 'A theory of the learnable', Communications of the ACM, Vol. 27, No. 11, pp.1134-1142.
    • (1984) Communications of the ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.G.1
  • 40
    • 85008532858 scopus 로고    scopus 로고
    • Intrusion detection scheme using traffic prediction for wireless industrial networks
    • Wei, M. and Kim, K. (2012) 'Intrusion detection scheme using traffic prediction for wireless industrial networks', Journal of Communications and Networks, Vol. 14, No. 3, pp.310-318.
    • (2012) Journal of Communications and Networks , vol.14 , Issue.3 , pp. 310-318
    • Wei, M.1    Kim, K.2
  • 42
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang, Y., Lee, W. and Huang, Y.A. (2003) 'Intrusion detection techniques for mobile wireless networks', Wireless Networks, Vol. 9, No. 5, pp.545-556.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.A.3
  • 43
    • 77955082590 scopus 로고    scopus 로고
    • Outlier detection techniques for wireless sensor networks: A survey
    • IEEE
    • Zhang, Y., Meratnia, N. and Havinga, P. (2010) 'Outlier detection techniques for wireless sensor networks: a survey', Communications Surveys & Tutorials, Vol. 12, No. 2, pp.159-170, IEEE.
    • (2010) Communications Surveys & Tutorials , vol.12 , Issue.2 , pp. 159-170
    • Zhang, Y.1    Meratnia, N.2    Havinga, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.