Secured network sensor-based defense system
暂无分享,去创建一个
Erik Blasch | Dan Shen | Genshe Chen | Khanh Pham | Linqiang Ge | Wei Yu | Sixiao Wei | Wei Yu | Genshe Chen | Dan Shen | Linqiang Ge | Sixiao Wei | Erik Blasch | K. Pham
[1] Xinwen Fu,et al. On effective localization attacks against Internet Threat monitors , 2013, 2013 IEEE International Conference on Communications (ICC).
[2] Matthias Hemmje,et al. A 3D Based User Interface for Information Retrieval Systems , 1993, Workshop on Database Issues for Data Visualization.
[3] John J. Salerno,et al. Measuring the worthiness of situation assessment , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).
[4] Genshe Chen,et al. Scheduling methods for unmanned aerial vehicle based delivery systems , 2014, 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC).
[5] Erik Blasch,et al. A Markov game theoretic data fusion approach for cyber situational awareness , 2007, SPIE Defense + Commercial Sensing.
[6] Jose B. Cruz,et al. Game Theoretic Approach to Threat Prediction and Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.
[7] Genshe Chen,et al. On detection and visualization techniques for cyber security situation awareness , 2013, Defense, Security, and Sensing.
[8] Jeffrey J. P. Tsai,et al. Modeling a secure sensor network system using an Extended Elementary Object System , 2008, 2008 7th IEEE International Conference on Cognitive Informatics.
[9] Luca Fanucci,et al. Smart transducer interface in embedded systems for networked sensors based on the emerging IEEE 1451 Standard: H2 Detection Case Study , 2009, 2009 Seventh Workshop on Intelligent solutions in Embedded Systems.
[10] Wei Yu,et al. A distributed network-sensor based intrusion detection framework in enterprise networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[11] Riccardo Bettati,et al. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.
[12] Erik Blasch,et al. Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions , 2014, Defense + Security Symposium.
[13] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[14] Daniel T. Fokum,et al. Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool , 2013, 2013 Proceedings of IEEE Southeastcon.
[15] Xun Wang,et al. An Invisible Localization Attack to Internet Threat Monitors , 2009, IEEE Transactions on Parallel and Distributed Systems.
[16] Wei Yu,et al. A threat monitoring system for smart mobiles in enterprise networks , 2013, RACS.
[17] Genshe Chen,et al. On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback , 2013, SNPD.
[18] Hans Hengartner,et al. Antigen localisation regulates immune responses in a dose‐ and time‐dependent fashion: a geographical view of immune reactivity , 1997, Immunological reviews.
[19] Koichi Hashimoto,et al. Fast and optimal sensor scheduling for networked sensor systems , 2008, 2008 47th IEEE Conference on Decision and Control.
[20] Yang Xin,et al. A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[21] Xinwen Fu,et al. On simulation studies of cyber attacks against LTE networks , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[22] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[23] Eloi Bosse,et al. High-Level Information Fusion Management and System Design , 2012 .
[24] Qian Du,et al. Optical Flow and Principal Component Analysis-Based Motion Detection in Outdoor Videos , 2010, EURASIP J. Adv. Signal Process..
[25] Erik Blasch,et al. Review of game theory applications for situation awareness , 2015, Defense + Security Symposium.