Amanote Research

Amanote Research

    RegisterSign In

Prioritizing Intrusion Analysis Using Dempster-Shafer Theory

doi 10.1145/2046684.2046694
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2011

Authors
Loai ZomlotSathya Chandran SundaramurthyKui LuoXinming OuS. Raj Rajagopalan
Publisher

ACM Press


Related search

Alert Fusion of Intrusion Detection Systems Using Fuzzy Dempster Shafer Theory

Journal of Engineering Science and Technology Review
Engineering
2017English

Combination of Evidence in Dempster-Shafer Theory

2002English

Using the Dempster-Shafer Theory of Evidence to Resolve ABox Inconsistencies

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Safety Case Confidence Propagation Based on Dempster-Shafer Theory

International Journal of Approximate Reasoning
Applied MathematicsTheoretical Computer ScienceArtificial IntelligenceSoftware
2019English

The Combining Rule of Dempster-Shafer Theory for Correlative Evidence

2007English

New Method for Fault Diagnosis Based on Dempster-Shafer Theory

Information Technology Journal
2013English

Dempster-Shafer Theory for Sensor Fusion in Autonomous Mobile Robots

IEEE Transactions on Robotics and Automation
1998English

Using Dempster-Shafer Theory to Fuse Multiple Information Sources in Region-Based Segmentation

2007English

fMRI Data Analysis Using Dempster-Shafer Method With Estimating Voxel Selectivity by Belief Measure

International Journal of Advanced Computer Science and Applications
Computer Science
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy