×
Abstract. This paper details a robust collaborative intrusion detection methodology for detecting attacks within a Cloud federation. It is a proactive.
Apr 13, 2022 · Abstract. This paper details a robust collaborative intrusion detection methodology for detecting attacks within a Cloud federation.
This paper details a robust collaborative intrusion detection methodology for detecting attacks within a Cloud federation. It is a proactive model and the ...
People also ask
Here we are using Dempster-Shafer evidence based theory to collect various evidences for various nodes in the network against black hole and grey hole attack.
This thesis demonstrates the use of the Dempster-Shafer theory of evidence on the battlefield. The use of the theory in a Decision.
Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. Abstract: The MANETs ...
D-S evidence theory is implemented to combine ITVs from different neighbours. Some of the neighbour nodes may declare a false ITV, which effect can also be ...
May 17, 2020 · The maximum anomaly score got from the IDS and a new parameter called weighted score is used in the Weighted Dempster-Shafer theory to take the ...
Missing: Prevention | Show results with:Prevention
We propose the DST-CEP, an approach that uses the Dempster–Shafer Theory to treat uncertainties. By using this theory, our solution can combine unreliable ...
Mar 15, 2022 · This paper addresses the problem of network security for distributed filtering when subject to malicious cyber attacks.
Missing: Prevention | Show results with:Prevention