Cited 0 time in
협력 게임 이론을 이용한 프라이버시 보존 네트워크 침입탐지 기술
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | 정병창 | - |
| dc.contributor.author | 한규범 | - |
| dc.date.accessioned | 2026-01-16T08:30:13Z | - |
| dc.date.available | 2026-01-16T08:30:13Z | - |
| dc.date.issued | 2025-12 | - |
| dc.identifier.issn | 2234-4772 | - |
| dc.identifier.issn | 2288-4165 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/81929 | - |
| dc.description.abstract | Network intrusion detection must reduce false alarms while catching attacks, yet data privacy prevents pooling traffic across sites and models are heterogeneous. We present a privacy-preserving, score-level ensemble that fuses only class probabilities from multiple NIDS. For each class, we define utility as average precision and compute exact Shapley values over model coalitions to obtain a model×class weight matrix. The weighted probabilities yield a global decision and can be updated in a sliding window without sharing raw data or parameters. On a public dataset our method outperforms Equal and Static weighting. The approach amplifies specialization, suppresses redundancy, and aligns with operational constraints. | - |
| dc.format.extent | 4 | - |
| dc.language | 한국어 | - |
| dc.language.iso | KOR | - |
| dc.publisher | 한국정보통신학회 | - |
| dc.title | 협력 게임 이론을 이용한 프라이버시 보존 네트워크 침입탐지 기술 | - |
| dc.title.alternative | Privacy-preserving Network Intrusion Detection based on Cooperation game theory | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.bibliographicCitation | 한국정보통신학회논문지, v.29, no.12, pp 1884 - 1887 | - |
| dc.citation.title | 한국정보통신학회논문지 | - |
| dc.citation.volume | 29 | - |
| dc.citation.number | 12 | - |
| dc.citation.startPage | 1884 | - |
| dc.citation.endPage | 1887 | - |
| dc.type.docType | Y | - |
| dc.identifier.kciid | ART003283737 | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.subject.keywordAuthor | Cooperative Game | - |
| dc.subject.keywordAuthor | Network Intrusion Detection | - |
| dc.subject.keywordAuthor | Ensemble learning | - |
| dc.subject.keywordAuthor | Privacy-preserved learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
