2015
DOI: 10.3103/s0146411615080283
|View full text |Cite
|
Sign up to set email alerts
|

Applying correlation analysis methods to control flow violation detection in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…There are in the literature some authors who propose applying geostatistics in the IoT environment in many different ways [35][36][37]. However, these works do not demonstrate the application method with concrete results, and they also do not propose a systematic way to apply the techniques-some of them only discuss the potential.…”
Section: Spatial Autocorrelationmentioning
confidence: 99%
“…There are in the literature some authors who propose applying geostatistics in the IoT environment in many different ways [35][36][37]. However, these works do not demonstrate the application method with concrete results, and they also do not propose a systematic way to apply the techniques-some of them only discuss the potential.…”
Section: Spatial Autocorrelationmentioning
confidence: 99%
“…We also aim to guarantee scalability. Indeed, having a fairly large number of users and communication channels is a scenario that will soon happen with the emergence of IoT (Internet of things) [27]. It should also be noted that CR is a promising enabler communication technology for IoT [28].…”
Section: Our Implementation Of Parallel Dynamic Programming On a Mult...mentioning
confidence: 99%
“…It may also require a large database of templates to identify a polymorphic intrusion, for which the indicative variants of its exploitation are different. The use of more complex, for instance, heuristic, signature-based methods allows the use of logical rules to set threshold values of monitored parameters, the excess of which indicates a violation [8,9]. Then, with precise definition of the detection rules, intrusion detection faults are minimized.…”
Section: The Sequence Alignment Algorithmsmentioning
confidence: 99%