2020
DOI: 10.1002/int.22330
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing host security using D‐S evidence theory and multisource information fusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Information fusion technology is a new science and technology produced by interdisciplinary integration. With the vigorous development of computer technology, the research on information fusion technology has also been further developed [ 1 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…Information fusion technology is a new science and technology produced by interdisciplinary integration. With the vigorous development of computer technology, the research on information fusion technology has also been further developed [ 1 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…D-S Evidence theory also proposes a combination rule for multi-source information, the Dempster combination rule [19,20,21]. There are many directions for the expansion of evidence theory: D numbers [22,23], evidential modeling [24,25], rule-based [26,27,28], evidence theory and fuzzy set [29,30], evidential neural network [31,32], and complex evidence theory [33], and others [34], which has extensions in different fields [35,36,37]. More combination methods also appeared in the later period of combination rules.…”
Section: Preliminariesmentioning
confidence: 99%
“…Covert channels can be an effective and efficient means of transmitting confidential information in untrusted IoT networks. [1][2][3] The deployment of Voice over Long Term Evolution (VoLTE) for next-generation audio and video communication over mobile networks has significantly increased the available data rates and quality of service (QoS). [4][5][6] The core network of this technology is a packet-switched network, that is also part of the 5G standard.…”
Section: Introductionmentioning
confidence: 99%