-
1Academic Journal
المؤلفون: Li, Wenjuan, Meng, Weizhi, Kwok, Lam For
المصدر: Li , W , Meng , W & Kwok , L F 2022 , ' Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions ' , IEEE Communications Surveys and Tutorials , vol. 24 , no. 1 , pp. 280-305 . https://doi.org/10.1109/COMST.2021.3139052
مصطلحات موضوعية: Collaborative Intrusion Detection, Trust computation and management, Insider Attacks, Distributed Network, Challenges and Future directions, Review and Survey
وصف الملف: application/pdf
-
2
المؤلفون: Wenjuan Li, Weizhi Meng, Lam-for KWOK
المصدر: Li, W, Meng, W & Kwok, L F 2022, ' Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions ', IEEE Communications Surveys and Tutorials, vol. 24, no. 1, pp. 280-305 . https://doi.org/10.1109/COMST.2021.3139052
مصطلحات موضوعية: Distributed Network, Insider Attacks, Collaborative Intrusion Detection, Trust computation and management, Electrical and Electronic Engineering, Challenges and Future directions, Review and Survey
وصف الملف: application/pdf
-
3Academic Journal
المؤلفون: Wenjuan Li, Weizhi Meng, Lam Kwok
المصدر: Future Internet; Volume 10; Issue 1; Pages: 6
مصطلحات موضوعية: intrusion detection, collaborative network, on–off attack, challenge-based mechanism, trust computation and management
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/fi10010006
الاتاحة: https://doi.org/10.3390/fi10010006
-
4Academic Journal
المؤلفون: Meng, Weizhi, Choo, Kim-Kwang Raymond, Furnell, Steven, Vasilakos, Athanasios V., Probst, Christian W.
المصدر: Meng , W , Choo , K-K R , Furnell , S , Vasilakos , A V & Probst , C W 2018 , ' Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks ' , IEEE Transactions on Network and Service Management , vol. 15 , no. 2 , pp. 761-773 . https://doi.org/10.1109/TNSM.2018.2815280
مصطلحات موضوعية: Intrusion Detection, Software-Defined Networking, Trust Computation and Management, Healthcare Network, Bayesian Inference
وصف الملف: application/pdf
-
5Book
المؤلفون: Meng, Weizhi, Li, Wenjuan, Wang, Yu, Au, Man
المصدر: Meng , W , Li , W , Wang , Y & Au , M 2017 , Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling . in Cyberspace Safety and Security . Springer , Cyberspace Safety and Security , vol. 10581 , pp. 163-175 , 9th International Symposium on Cyberspace Safety and Security , Xi'an , China , 23/10/2017 . https://doi.org/10.1007/978-3-319-69471-9_12
مصطلحات موضوعية: Collaborative network, Intrusion detection, Medical Smartphone Network, Trust computation and management, Insider attack, Malicious node
Relation: https://orbit.dtu.dk/en/publications/c3075412-5b9f-4177-8ac2-d688707e6e9c; urn:ISBN:9783319694719
-
6Electronic Resource
المؤلفون: Li, Wenjuan, Meng, Weizhi, Kwok, Lam For
المصدر: Li , W , Meng , W & Kwok , L F 2018 , ' Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks ' , Future Internet , vol. 10 , no. 1 .
مصطلحات الفهرس: Collaborative network, On–off attack, Challenge-based Mechanism, Trust computation and management, Intrusion detectors, article