메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 1069-1083

Bayesian networks for intrusion dependency analysis in water controlling systems

Author keywords

Bayesian network; Importance index; Internet of Things; Intrusion detection; Water controlling system

Indexed keywords

INDUSTRIAL MANAGEMENT; INFERENCE ENGINES; INTERNET OF THINGS; INTRUSION DETECTION; NETWORK SECURITY; QUALITY ASSURANCE; SMART CITY;

EID: 85049914497     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.14     Document Type: Article
Times cited : (8)

References (32)
  • 1
    • 84910149653 scopus 로고    scopus 로고
    • Security of the internet of things: Perspectives and challenges
    • Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: Perspectives and challenges,” Wireless Networks, Vol. 20, 2014, pp. 2481-2501.
    • (2014) Wireless Networks , vol.20 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 3
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
    • Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
    • (2016) IEEE Transactions on Information Forensics and Security , vol.11 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Großschädl, J.3    Kim, H.4
  • 5
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • F. Zhangjie, S. Xingming, L. Qi, Z. Lu, and S. Jiangang, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. 98, 2015, pp. 190-200.
    • (2015) IEICE Transactions on Communications , vol.98 , pp. 190-200
    • Zhangjie, F.1    Xingming, S.2    Qi, L.3    Lu, Z.4    Jiangang, S.5
  • 6
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • J. Shen, H.-W. Tan, J. Wang, J.-W. Wang, and S.-Y. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
    • (2015) Journal of Internet Technology , vol.16 , pp. 171-178
    • Shen, J.1    Tan, H.-W.2    Wang, J.3    Wang, J.-W.4    Lee, S.-Y.5
  • 7
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • S. Xie and Y. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, Vol. 78, 2014, pp. 231-246.
    • (2014) Wireless Personal Communications , vol.78 , pp. 231-246
    • Xie, S.1    Wang, Y.2
  • 8
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • P. Guo, J. Wang, X. H. Geng, C. S. Kim, and J.-U. Kim, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, Vol. 15, 2014, pp. 929-935.
    • (2014) Journal of Internet Technology , vol.15 , pp. 929-935
    • Guo, P.1    Wang, J.2    Geng, X.H.3    Kim, C.S.4    Kim, J.-U.5
  • 9
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys and Tutorials, Vol. 16, 2014, pp. 266-282.
    • (2014) IEEE Communications Surveys and Tutorials , vol.16 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 10
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R. A. Kemmerer and G. Vigna, “Intrusion detection: a brief history and overview,” Computer, Vol. 35, 2002, pp. 27-30.
    • (2002) Computer , vol.35 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 14
    • 84865209539 scopus 로고    scopus 로고
    • A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
    • L. Koc, T. A. Mazzuchi, and S. Sarkani, “A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier,” Expert Systems with Applications, Vol. 39, 2012, pp. 13492-13500.
    • (2012) Expert Systems with Applications , vol.39 , pp. 13492-13500
    • Koc, L.1    Mazzuchi, T.A.2    Sarkani, S.3
  • 16
    • 84885328301 scopus 로고    scopus 로고
    • SVELTE: Real-time intrusion detection in the Internet of Things
    • S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, Vol. 11, 2013, pp. 2661-2674.
    • (2013) Ad Hoc Networks , vol.11 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 17
    • 80052971033 scopus 로고    scopus 로고
    • A practice-driven systematic review of dependency analysis solutions
    • T. B. C. Arias, P. van der Spek, and P. Avgeriou, “A practice-driven systematic review of dependency analysis solutions,” Empirical Software Engineering, Vol. 16, 2011, pp. 544-586.
    • (2011) Empirical Software Engineering , vol.16 , pp. 544-586
    • Arias, T.B.C.1    Van Der Spek, P.2    Avgeriou, P.3
  • 20
    • 34047271093 scopus 로고    scopus 로고
    • Software reliability analysis by considering fault dependency and debugging time lag
    • C.-Y. Huang and C.-T. Lin, “Software reliability analysis by considering fault dependency and debugging time lag,” IEEE Transactions on Reliability, Vol. 55, 2006, pp. 436-450.
    • (2006) IEEE Transactions on Reliability , vol.55 , pp. 436-450
    • Huang, C.-Y.1    Lin, C.-T.2
  • 21
    • 0032081096 scopus 로고    scopus 로고
    • Pipe segment failure dependency analysis and system failure probability estimation
    • L. Xie, “Pipe segment failure dependency analysis and system failure probability estimation,” International Journal of Pressure Vessels and Piping, Vol. 75, 1998, pp. 483-488.
    • (1998) International Journal of Pressure Vessels and Piping , vol.75 , pp. 483-488
    • Xie, L.1
  • 23
  • 26
    • 84867177526 scopus 로고    scopus 로고
    • Bayesian networks for modeling failure dependency in access control models
    • S. S. Alaboodi and G. B. Agnew, “Bayesian networks for modeling failure dependency in access control models,” in World Congress on Internet Security, 2012, pp. 176-182.
    • (2012) World Congress on Internet Security , pp. 176-182
    • Alaboodi, S.S.1    Agnew, G.B.2
  • 29
    • 85049915321 scopus 로고    scopus 로고
    • Hierarchical Bayesian networks: A probabilistic reasoning model for structured domains
    • G. A. Vouros, T. Panayiotopoulos, ed, Springer, NY
    • E. Gyftodimos and P. A. Flach, “Hierarchical bayesian networks: A probabilistic reasoning model for structured domains,” in G. A. Vouros, T. Panayiotopoulos, ed., Methods and Applications of Artificial Intelligence, Springer, NY, 2002, pp. 291-300.
    • (2002) Methods and Applications of Artificial Intelligence , pp. 291-300
    • Gyftodimos, E.1    Flach, P.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.