Milcom 2006 2006
DOI: 10.1109/milcom.2006.302496
|View full text |Cite
|
Sign up to set email alerts
|

The Joint Airborne Network Services Suite

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…The traffic includes Web, Mail, Skype, traffic generated by Peer-to-Peer applications and other protocols, around 79000 conversations in total. For airborne network, most services [35][36][37][38] It can be seen from Fig. 5 that flow sizes in the selected dataset is widely distributed, ranging from a few packets to millions of packets.…”
Section: A Dataset and Settingsmentioning
confidence: 99%
“…The traffic includes Web, Mail, Skype, traffic generated by Peer-to-Peer applications and other protocols, around 79000 conversations in total. For airborne network, most services [35][36][37][38] It can be seen from Fig. 5 that flow sizes in the selected dataset is widely distributed, ranging from a few packets to millions of packets.…”
Section: A Dataset and Settingsmentioning
confidence: 99%
“…Sedjelmaci et al [17] Hierarchical IDS Threat classification & behavior monitoring Mitchell and Chen [11] Behavior rule-based evaluations Minimizing false positives & false negatives Kwon et al [8] Safety analysis under stealthy cyber attacks Real-time safety assessment Lauf and Robinson [9] Distributed resource system Intrusion-tolerance strategy Shen et al [24] Game theoretic approach Based on the three levels: object, situation and threat. Sedjelmaci et al [15] Security game framework Optimal setting identification based on intrusion detection rate with minimum overhead using Bayesian game Trafton and Pizzi [25] Network service suite Framework for information assurance of UAVs • Instant acknowledgement: In this acknowledgment, an IDS monitoring is performed at real-time and decisions or alarms are generated in the form of instant acknowledgments. • Periodic acknowledgement: In this acknowledgement, an IDS continuously gathers the data but the decisions are based on the periodical analysis of received data.…”
Section: Ids Acknowledgmentmentioning
confidence: 99%
“…Trafton and Pizzi [25] proposed the so called Joint Airborne Network Services Suite, which aims to integrate an airborne military network by allowing the implementation of various possible hardware and software solutions. In this work, an IDS is considered as an integral part of their assurance strategy.…”
Section: Survey Of Existing Uav-ids Approachesmentioning
confidence: 99%
See 1 more Smart Citation