Journal articles on the topic 'Agent Based Intrusion Detection System (AIDS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Agent Based Intrusion Detection System (AIDS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
J., K. Mandal, and Lutful Hassan Khondekar. "A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET." International Journal of Network Security & Its Applications (IJNSA) 5, no. 5 (2013): 179–83. https://doi.org/10.5281/zenodo.5602381.
Full textTiwari, S. K., D. S. Pandey, and V. Namdeo. "A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 204–10. http://dx.doi.org/10.26438/ijcse/v6i7.204210.
Full textDasgupta, D., F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii. "CIDS: An agent-based intrusion detection system." Computers & Security 24, no. 5 (2005): 387–98. http://dx.doi.org/10.1016/j.cose.2005.01.004.
Full textXie, Ping, and Wei Wang. "The Study and Simulation on Campus Network Intrusion Detection System." Advanced Materials Research 490-495 (March 2012): 2657–61. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.2657.
Full textHegazy, I. M., T. Al-Arif, Z. T. Fayed, and H. M. Faheem. "A multi-agent based system for intrusion detection." IEEE Potentials 22, no. 4 (2003): 28–31. http://dx.doi.org/10.1109/mp.2003.1238690.
Full textGowadia, Vaibhav, Csilla Farkas, and Marco Valtorta. "PAID: A Probabilistic Agent-Based Intrusion Detection system." Computers & Security 24, no. 7 (2005): 529–45. http://dx.doi.org/10.1016/j.cose.2005.06.008.
Full textLiu, Yang Bin, Liang Shi, Bei Zhan Wang, Yuan Qin Wu, and Pan Hong Wang. "An New Agent Based Distributed Adaptive Intrusion Detection System." Advanced Materials Research 532-533 (June 2012): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.624.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textQasim, Awais, Muhammad Bilal, Adeel Munawar, and Shuja Ur Rehman Baig. "Blockchain based intrusion detection in agent-driven flight operations." Multiagent and Grid Systems 20, no. 2 (2024): 161–83. http://dx.doi.org/10.3233/mgs-240017.
Full textAlazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.
Full textCai, Yan Jing, Xian Yi Cheng, and Yan Pan. "Solutions of Single Point of Failure in Intrusion Detection System." Applied Mechanics and Materials 128-129 (October 2011): 285–88. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.285.
Full textSODIYA, ADESINA SIMON. "MULTI-LEVEL AND SECURED AGENT-BASED INTRUSION DETECTION SYSTEM." Journal of Computing and Information Technology 14, no. 3 (2006): 217. http://dx.doi.org/10.2498/cit.2006.03.05.
Full textWang, Jin. "An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System." Journal of Computer Research and Development 42, no. 11 (2005): 1934. http://dx.doi.org/10.1360/crad20051116.
Full textRenjit, J. Arokia. "Distributed and cooperative multi-agent based intrusion detection system." Indian Journal of Science and Technology 3, no. 10 (2010): 1070–74. http://dx.doi.org/10.17485/ijst/2010/v3i10.2.
Full textSingh, Arjun, Surbhi Chauhan, Kamal Kant, and Reshma Dokania. "Agent based Decentralized and Fault Tolerant Intrusion Detection System." International Journal of Computer Applications 47, no. 1 (2012): 1–6. http://dx.doi.org/10.5120/7149-9850.
Full textChen, Hai Yan. "Development and Design of Intelligent Intrusion Detection System Based on Data Mining." Applied Mechanics and Materials 602-605 (August 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1526.
Full textAlazab, Ammar, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, and Mamoun Alazab. "Using response action with intelligent intrusion detection and prevention system against web application malware." Information Management & Computer Security 22, no. 5 (2014): 431–49. http://dx.doi.org/10.1108/imcs-02-2013-0007.
Full textGanapathy, S., P. Yogesh, and A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM." Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.
Full textRey, E. Mosqueira, A. Alonso Betanzos, B. Guijarro Berdinas, D. Alonso Rios, and J. Lago Pineiro. "A Snort-based agent for a JADE multi-agent intrusion detection system." International Journal of Intelligent Information and Database Systems 3, no. 1 (2009): 107. http://dx.doi.org/10.1504/ijiids.2009.023041.
Full textZachos, Georgios, Ismael Essop, Georgios Mantas, Kyriakos Porfyrakis, José C. Ribeiro, and Jonathan Rodriguez. "An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks." Electronics 10, no. 21 (2021): 2562. http://dx.doi.org/10.3390/electronics10212562.
Full textZeng, Xia Ling. "Cluster-Based Intrusion Detection Model for Wireless Sensor Network." Applied Mechanics and Materials 631-632 (September 2014): 914–17. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.914.
Full textAchbarou, Omar, My Ahmed El Kiram, and Salim Elbouanani. "Cloud Security: A Multi Agent Approach Based Intrusion Detection System." Indian Journal of Science and Technology 10, no. 18 (2017): 1–6. http://dx.doi.org/10.17485/ijst/2017/v10i18/109044.
Full textJain, Chandrakant, and Aumreesh Kumar Saxena. "General Study of Mobile Agent Based Intrusion Detection System (IDS)." Journal of Computer and Communications 04, no. 04 (2016): 93–98. http://dx.doi.org/10.4236/jcc.2016.44008.
Full textNakkeeran, R., T. Aruldoss Albert, and R. Ezumalai. "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks." International Journal of Engineering and Technology 2, no. 1 (2010): 52–56. http://dx.doi.org/10.7763/ijet.2010.v2.99.
Full textKhraisat, Ansam, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman, and Ammar Alazab. "Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine." Electronics 9, no. 1 (2020): 173. http://dx.doi.org/10.3390/electronics9010173.
Full textLiu, Zhi Yue, and Jian Wang. "A Research into an Intrusion Detection System Based on Immune Principle and Multi-Agent in WSN." Advanced Materials Research 433-440 (January 2012): 5157–61. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5157.
Full textKhraisat, Gondal, Vamplew, Kamruzzaman, and Alazab. "A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks." Electronics 8, no. 11 (2019): 1210. http://dx.doi.org/10.3390/electronics8111210.
Full textBajtoš, Tomáš, Andrej Gajdoš, Lenka Kleinová, Katarína Lučivjanská, and Pavol Sokol. "Network Intrusion Detection with Threat Agent Profiling." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/3614093.
Full textViju, G. K., and Khalid Ahmed Ibrahim. "Deployment of Agent-Based Intrusion Detection for Wireless LAN." FES Journal of Engineering Sciences 6, no. 1 (2012): 12. http://dx.doi.org/10.52981/fjes.v6i1.24.
Full textLiang, Chao, Bharanidharan Shanmugam, Sami Azam, et al. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems." Electronics 9, no. 7 (2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Full textJavidi, Mohammad Masoud. "Network Attacks Detection by Hierarchical Neural Network." Computer Engineering and Applications Journal 4, no. 2 (2015): 119–32. http://dx.doi.org/10.18495/comengapp.v4i2.108.
Full textSandosh, S., V. Govindasamy, and G. Akila. "Enhanced intrusion detection system via agent clustering and classification based on outlier detection." Peer-to-Peer Networking and Applications 13, no. 3 (2020): 1038–45. http://dx.doi.org/10.1007/s12083-019-00822-3.
Full textWang, Yue, Ran Tao, and Hao Zhang. "Research on distributed intrusion detection system based on multi-living agent." Science China Information Sciences 53, no. 5 (2010): 1067–77. http://dx.doi.org/10.1007/s11432-010-0086-9.
Full textGondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.
Full textEnyindah, P., and Uzochukwu C. Onwuachu. "An Intrusion Detection System Application for an Organisation." Circulation in Computer Science 2, no. 3 (2017): 23–28. http://dx.doi.org/10.22632/ccs-2017-251-87.
Full textAmrita, Amrita, Arun .., and Aditi Sharma. "A Hybrid Intrusion Detection Approach for Cyber Attacks." Journal of Cybersecurity and Information Management 8, no. 2 (2024): 08–18. http://dx.doi.org/10.54216/jcim.130201.
Full textBattini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.
Full textSeyedeh, Yasaman Rashida. "HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 45–54. https://doi.org/10.5281/zenodo.4267213.
Full textLokbani, Ahmed Chaouki, Ahmed Lehireche, Reda Mohamed Hamou, and Mohamed Amine Boudia. "An Approach based on Social Bees for an Intrusion Detection System by Scenario." International Journal of Organizational and Collective Intelligence 5, no. 3 (2015): 44–67. http://dx.doi.org/10.4018/ijoci.2015070104.
Full textAlazab, Ammar, Ansam Khraisat, Sarabjot Singh, Savitri Bevinakoppa, and Osama A. Mahdi. "Routing Attacks Detection in 6LoWPAN-Based Internet of Things." Electronics 12, no. 6 (2023): 1320. http://dx.doi.org/10.3390/electronics12061320.
Full textAlmania, Moaad, Anazida Zainal, Fuad A. Ghaleb, Ahmad Alnawasrah, and Mahmoud Al Qerom. "Adaptive Intrusion Detection System with Ensemble Classifiers for Handling Imbalanced Datasets and Dynamic Network Traffic." Journal of Robotics and Control (JRC) 6, no. 1 (2025): 114–23. https://doi.org/10.18196/jrc.v6i1.23648.
Full textSaxena, Arun, and A. K. Sharma. "An Agent based Distributed Security System for Intrusion Detection in Computer Networks." International Journal of Computer Applications 12, no. 3 (2010): 18–27. http://dx.doi.org/10.5120/1659-2234.
Full textSingh, Namita, Siddharth Krishan, and Uday Kumar Singh. "An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log." International Journal of Computer Applications 100, no. 9 (2014): 1–5. http://dx.doi.org/10.5120/17550-8146.
Full textZhai, Shuang-can, Chen-jun Hu, and Wei-ming Zhang. "Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network." International Journal of Security and Its Applications 8, no. 2 (2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.2.19.
Full textEesa, Adel S., Adnan M. Abdulazeez, and Zeynep Orman. "A DIDS Based on The Combination of Cuttlefish Algorithm and Decision Tree." Science Journal of University of Zakho 5, no. 4 (2017): 313. http://dx.doi.org/10.25271/2017.5.4.382.
Full textKarraz, George. "Develop an Intelligent Anomaly Intrusion Detection System in Computer Networks based on Resilient Back-propagation Neural Network." Damascus University Journal for Basic Sciences, no. 10566-196 (April 29, 2024): 1–18. https://doi.org/10.5281/zenodo.11087938.
Full textAl-Shourbaji, Ibrahim, and Samaher Al-Janabi. "Intrusion Detection and Prevention Systems in Wireless Networks." Kurdistan Journal of Applied Research 2, no. 3 (2017): 267–72. http://dx.doi.org/10.24017/science.2017.3.48.
Full textFranklin, Eichie, and Bernardi Pranggono. "Anomaly-Based Intrusion Detection System for the Internet of Medical Things." IJID (International Journal on Informatics for Development) 12, no. 2 (2024): 374–85. https://doi.org/10.14421/ijid.2023.4308.
Full textDwivedi, Abhijit, Y. K. Rana Y.K.Rana, and B. P. Patel B.P.Patel. "A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)." International Journal of Computer Applications 113, no. 12 (2015): 33–40. http://dx.doi.org/10.5120/19881-1895.
Full textKumar Saxena, Aumreesh, Sitesh Sinha, and Piyush Shukla. "Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System." International Journal of Computer Network and Information Security 10, no. 3 (2018): 17–24. http://dx.doi.org/10.5815/ijcnis.2018.03.03.
Full text