The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estimate the likelihood of an intrusion. The theory\u27s rule of combination gives a numerical method to fuse multiple pieces of information to derive a conclusion. But, D-S theory has its shortcomings when used in situations where evidence has significant conflict. Though the observers may have different values of uncertainty in the observed data, D-S theory considers the observers to be equally trustworthy. This thesis introduces a new method of combination based on D-S theory and Consensus method, that takes into consideration the reliability of evidence used in data fusion. The new method\u27s results have been compared against three other meth...
The recent experiences of asymmetric urban military operations have highlighted the pressing need fo...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
In order to meet the higher accuracy and system reliability requirements, the information fusion for...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
This article addresses the performance of Dempster-Shafer (DS) theory, when it is slightly modified ...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
A new DS (Dempster-Shafer) combination method is presented in this paper. As data detected by a sing...
In our present work we present some of the most popular data fusion algorithms that have inspired u...
Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used t...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
To eliminate potential evidence conflicts, an effective and accurate DS combination method is addres...
Dempster–Shafer evidence theory is an effective way to solve multi-sensor data fusion problems. Afte...
The recent experiences of asymmetric urban military operations have highlighted the pressing need fo...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
In order to meet the higher accuracy and system reliability requirements, the information fusion for...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
This article addresses the performance of Dempster-Shafer (DS) theory, when it is slightly modified ...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
A new DS (Dempster-Shafer) combination method is presented in this paper. As data detected by a sing...
In our present work we present some of the most popular data fusion algorithms that have inspired u...
Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used t...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
To eliminate potential evidence conflicts, an effective and accurate DS combination method is addres...
Dempster–Shafer evidence theory is an effective way to solve multi-sensor data fusion problems. Afte...
The recent experiences of asymmetric urban military operations have highlighted the pressing need fo...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
In order to meet the higher accuracy and system reliability requirements, the information fusion for...