Amanote Research
Register
Sign In
Prioritizing Intrusion Analysis Using Dempster-Shafer Theory
doi 10.1145/2046684.2046694
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2011
Authors
Loai Zomlot
Sathya Chandran Sundaramurthy
Kui Luo
Xinming Ou
S. Raj Rajagopalan
Publisher
ACM Press
Related search
Alert Fusion of Intrusion Detection Systems Using Fuzzy Dempster Shafer Theory
Journal of Engineering Science and Technology Review
Engineering
Combination of Evidence in Dempster-Shafer Theory
Using the Dempster-Shafer Theory of Evidence to Resolve ABox Inconsistencies
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Safety Case Confidence Propagation Based on Dempster-Shafer Theory
International Journal of Approximate Reasoning
Applied Mathematics
Theoretical Computer Science
Artificial Intelligence
Software
The Combining Rule of Dempster-Shafer Theory for Correlative Evidence
New Method for Fault Diagnosis Based on Dempster-Shafer Theory
Information Technology Journal
Dempster-Shafer Theory for Sensor Fusion in Autonomous Mobile Robots
IEEE Transactions on Robotics and Automation
Using Dempster-Shafer Theory to Fuse Multiple Information Sources in Region-Based Segmentation
fMRI Data Analysis Using Dempster-Shafer Method With Estimating Voxel Selectivity by Belief Measure
International Journal of Advanced Computer Science and Applications
Computer Science