A Security Situation Prediction Algorithm Based on HMM in Mobile Network
暂无分享,去创建一个
Jing Long | Kuan-Ching Li | Qingyong Zhang | Xiaolong Yan | Wei Liang | Zuo Chen | Yanbiao Li | Kuan-Ching Li | Yanbiao Li | Jing Long | Zuo Chen | Wei Liang | Xiaolong Yan | Qingyong Zhang
[1] Tan Xiao. A Hidden Markov Model Used in Intrusion Detection , 2003 .
[2] Feng Yao. The Application of Weighted Markov\|Chain to the Prediction of River Runoff State , 1999 .
[3] Wei Liang,et al. A distributed data secure transmission scheme in wireless sensor network , 2017, Int. J. Distributed Sens. Networks.
[4] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[5] Arumugam Nallanathan,et al. Industrial wireless sensor networks 2016 , 2017, Int. J. Distributed Sens. Networks.
[6] D. Marquis,et al. Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks , 1999 .
[7] Guo-Long Chen,et al. Research of Network Security Situation Prediction Based on Multidimensional Cloud Model , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[8] Dhanashri Ashok Bhosale,et al. Comparative study and analysis of network intrusion detection tools , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[9] J. Álvarez-Ramírez,et al. Multiscale entropy analysis of crude oil price dynamics , 2011 .
[10] Wei Liang,et al. RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN , 2016, J. Sensors.
[11] Xiaodong Zheng,et al. Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).
[12] Peng Zhang,et al. A traffic flow state transition model for urban road network based on Hidden Markov Model , 2016, Neurocomputing.
[13] Xiaodai Dong,et al. Locally minimum storage regenerating codes in distributed cloud storage systems , 2017, China Communications.
[14] Constantinos S. Pattichis,et al. Multiscale entropy-based approach to automated surface EMG classification of neuromuscular disorders , 2010, Medical & Biological Engineering & Computing.
[15] Yung-Wey Chong,et al. Optimized access point selection with mobility prediction using hidden Markov Model for wireless network , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[16] 什洛莫·图布尔. System and method for providing network security to mobile devices , 2006 .
[17] Giovanni Vigna,et al. Using hidden markov models to evaluate the risks of intrusions : System architecture and model validation , 2006 .
[18] Wei Liang,et al. A two-step MF signal acquisition method for wireless underground sensor networks , 2016, Comput. Sci. Inf. Syst..
[19] Christopher Krügel,et al. Alert Verification Determining the Success of Intrusion Attempts , 2004, DIMVA.
[20] Chung-Kang Peng,et al. Costa, Goldberger, and Peng Reply: , 2003 .
[21] Jiang,et al. A scalable model for network situational awareness based on Endsley' s situation model , 2007 .
[22] Peter Kortis,et al. Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS/IPS) design for an IP networks , 2015, 2015 13th International Conference on Emerging eLearning Technologies and Applications (ICETA).
[23] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[24] Liang Hu,et al. Multi-stage Attack Detection Algorithm Based on Hidden Markov Model , 2012, WISM.
[25] Giovanni Vigna,et al. Using Hidden Markov Models to Evaluate the Risks of Intrusions , 2006, RAID.
[26] Yan Ruo-yu,et al. Multi-scale Entropy Based Traffic Analysis and Anomaly Detection , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[27] Sherif Abdelwahed,et al. A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[28] Jing Wang,et al. Device-to-Device Relay Cooperative Transmission Based on Network Coding , 2017, KSII Transactions on Internet and Information Systems.
[29] Heng Wu,et al. Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks , 2017, Sensors.
[30] Madalena Costa,et al. Multiscale entropy analysis of biological signals. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.