-
1
-
-
84910149653
-
Security of the internet of things: Perspectives and challenges
-
Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: Perspectives and challenges,” Wireless Networks, Vol. 20, 2014, pp. 2481-2501.
-
(2014)
Wireless Networks
, vol.20
, pp. 2481-2501
-
-
Jing, Q.1
Vasilakos, A.V.2
Wan, J.3
Lu, J.4
Qiu, D.5
-
2
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, and A. Sung, “Intrusion detection using neural networks and support vector machines,” in Proceedings of International Joint Conference on Neural Networks, 2002, pp. 1702-1707.
-
(2002)
Proceedings of International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
3
-
-
84963856290
-
Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Großschädl, J.3
Kim, H.4
-
4
-
-
85021181773
-
On emerging family of elliptic curves to secure internet of things: ECC comes of age
-
Z. Liu, X. Huang, Z. Hu, M. K. Khan, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: ECC comes of age,” IEEE Transactions on Dependable and Secure Computing, Vol. 14, 2017, pp. 237-248.
-
(2017)
IEEE Transactions on Dependable and Secure Computing
, vol.14
, pp. 237-248
-
-
Liu, Z.1
Huang, X.2
Hu, Z.3
Khan, M.K.4
Zhou, L.5
-
5
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
F. Zhangjie, S. Xingming, L. Qi, Z. Lu, and S. Jiangang, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. 98, 2015, pp. 190-200.
-
(2015)
IEICE Transactions on Communications
, vol.98
, pp. 190-200
-
-
Zhangjie, F.1
Xingming, S.2
Qi, L.3
Lu, Z.4
Jiangang, S.5
-
6
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
J. Shen, H.-W. Tan, J. Wang, J.-W. Wang, and S.-Y. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 171-178
-
-
Shen, J.1
Tan, H.-W.2
Wang, J.3
Wang, J.-W.4
Lee, S.-Y.5
-
7
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
S. Xie and Y. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, Vol. 78, 2014, pp. 231-246.
-
(2014)
Wireless Personal Communications
, vol.78
, pp. 231-246
-
-
Xie, S.1
Wang, Y.2
-
8
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
P. Guo, J. Wang, X. H. Geng, C. S. Kim, and J.-U. Kim, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, Vol. 15, 2014, pp. 929-935.
-
(2014)
Journal of Internet Technology
, vol.15
, pp. 929-935
-
-
Guo, P.1
Wang, J.2
Geng, X.H.3
Kim, C.S.4
Kim, J.-U.5
-
9
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys and Tutorials, Vol. 16, 2014, pp. 266-282.
-
(2014)
IEEE Communications Surveys and Tutorials
, vol.16
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
10
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
R. A. Kemmerer and G. Vigna, “Intrusion detection: a brief history and overview,” Computer, Vol. 35, 2002, pp. 27-30.
-
(2002)
Computer
, vol.35
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
11
-
-
84870713037
-
Intrusion detection system: A comprehensive review
-
H.-J. Liao, C.-H. R. Lin, Y.-C. Lin, and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” Journal of Network and Computer Applications, Vol. 36, 2013, pp. 16-24.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, pp. 16-24
-
-
Liao, H.-J.1
Lin, C.-H.R.2
Lin, Y.-C.3
Tung, K.-Y.4
-
12
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in cloud,” Journal of Network and Computer Applications, Vol. 36, 2013, pp. 42-57.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
14
-
-
84865209539
-
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
-
L. Koc, T. A. Mazzuchi, and S. Sarkani, “A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier,” Expert Systems with Applications, Vol. 39, 2012, pp. 13492-13500.
-
(2012)
Expert Systems with Applications
, vol.39
, pp. 13492-13500
-
-
Koc, L.1
Mazzuchi, T.A.2
Sarkani, S.3
-
16
-
-
84885328301
-
SVELTE: Real-time intrusion detection in the Internet of Things
-
S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, Vol. 11, 2013, pp. 2661-2674.
-
(2013)
Ad Hoc Networks
, vol.11
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
17
-
-
80052971033
-
A practice-driven systematic review of dependency analysis solutions
-
T. B. C. Arias, P. van der Spek, and P. Avgeriou, “A practice-driven systematic review of dependency analysis solutions,” Empirical Software Engineering, Vol. 16, 2011, pp. 544-586.
-
(2011)
Empirical Software Engineering
, vol.16
, pp. 544-586
-
-
Arias, T.B.C.1
Van Der Spek, P.2
Avgeriou, P.3
-
18
-
-
0032065846
-
Two classes of Boolean functions for dependency analysis
-
T. Armstrong, K. Marriott, P. Schachte, and H. Søndergaard, “Two classes of Boolean functions for dependency analysis,” Science of Computer Programming, Vol. 31, 1998, pp. 3-45.
-
(1998)
Science of Computer Programming
, vol.31
, pp. 3-45
-
-
Armstrong, T.1
Marriott, K.2
Schachte, P.3
Søndergaard, H.4
-
20
-
-
34047271093
-
Software reliability analysis by considering fault dependency and debugging time lag
-
C.-Y. Huang and C.-T. Lin, “Software reliability analysis by considering fault dependency and debugging time lag,” IEEE Transactions on Reliability, Vol. 55, 2006, pp. 436-450.
-
(2006)
IEEE Transactions on Reliability
, vol.55
, pp. 436-450
-
-
Huang, C.-Y.1
Lin, C.-T.2
-
21
-
-
0032081096
-
Pipe segment failure dependency analysis and system failure probability estimation
-
L. Xie, “Pipe segment failure dependency analysis and system failure probability estimation,” International Journal of Pressure Vessels and Piping, Vol. 75, 1998, pp. 483-488.
-
(1998)
International Journal of Pressure Vessels and Piping
, vol.75
, pp. 483-488
-
-
Xie, L.1
-
22
-
-
85026758936
-
Enterprise architecture dependency analysis using fault trees and Bayesian networks
-
U. Franke, W. R. Flores, and P. Johnson, “Enterprise architecture dependency analysis using fault trees and bayesian networks,” in Proceedings of the Spring Simulation Multiconference, 2009, pp. 1-8.
-
(2009)
Proceedings of The Spring Simulation Multiconference
, pp. 1-8
-
-
Franke, U.1
Flores, W.R.2
Johnson, P.3
-
23
-
-
78650279864
-
Identifying influential factors of business process performance using dependency analysis
-
B. Wetzstein, P. Leitner, F. Rosenberg, S. Dustdar, and F. Leymann, “Identifying influential factors of business process performance using dependency analysis,” Enterprise Information Systems, Vol. 5, 2011, pp. 79-98.
-
(2011)
Enterprise Information Systems
, vol.5
, pp. 79-98
-
-
Wetzstein, B.1
Leitner, P.2
Rosenberg, F.3
Dustdar, S.4
Leymann, F.5
-
24
-
-
0015974558
-
Structured design
-
W. P. Stevens, G. J. Myers, and L. L. Constantine, “Structured design,” IBM Systems Journal, Vol. 13, 1974, pp. 115-139.
-
(1974)
IBM Systems Journal
, vol.13
, pp. 115-139
-
-
Stevens, W.P.1
Myers, G.J.2
Constantine, L.L.3
-
25
-
-
20344385695
-
Dependency analysis using conceptual graphs
-
L. Cox, H. S. Delugach, and D. Skipper, “Dependency analysis using conceptual graphs,” in Proceedings of the 9th International Conference on Conceptual Structures, 2001, pp. 117-130.
-
(2001)
Proceedings of The 9th International Conference on Conceptual Structures
, pp. 117-130
-
-
Cox, L.1
Delugach, H.S.2
Skipper, D.3
-
26
-
-
84867177526
-
Bayesian networks for modeling failure dependency in access control models
-
S. S. Alaboodi and G. B. Agnew, “Bayesian networks for modeling failure dependency in access control models,” in World Congress on Internet Security, 2012, pp. 176-182.
-
(2012)
World Congress on Internet Security
, pp. 176-182
-
-
Alaboodi, S.S.1
Agnew, G.B.2
-
27
-
-
77956574602
-
Using Bayesian networks for cyber security analysis
-
P. Xie, J. H. Li, X. Ou, P. Liu, and R. Levy, “Using Bayesian networks for cyber security analysis,” in Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, 2010, pp. 211-220.
-
(2010)
Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 211-220
-
-
Xie, P.1
Li, J.H.2
Ou, X.3
Liu, P.4
Levy, R.5
-
29
-
-
85049915321
-
Hierarchical Bayesian networks: A probabilistic reasoning model for structured domains
-
G. A. Vouros, T. Panayiotopoulos, ed, Springer, NY
-
E. Gyftodimos and P. A. Flach, “Hierarchical bayesian networks: A probabilistic reasoning model for structured domains,” in G. A. Vouros, T. Panayiotopoulos, ed., Methods and Applications of Artificial Intelligence, Springer, NY, 2002, pp. 291-300.
-
(2002)
Methods and Applications of Artificial Intelligence
, pp. 291-300
-
-
Gyftodimos, E.1
Flach, P.A.2
-
30
-
-
0003584577
-
-
Prentice-Hall, NJ
-
S. J. Russell, P. Norvig, J. F. Canny, J. M. Malik, and D. D. Edwards, Artificial Intelligence: A Modern Approach, Prentice-Hall, NJ, 1995.
-
(1995)
Artificial Intelligence: A Modern Approach
-
-
Russell, S.J.1
Norvig, P.2
Canny, J.F.3
Malik, J.M.4
Edwards, D.D.5
|