Academic literature on the topic 'Anomaly-based intrusion'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anomaly-based intrusion.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anomaly-based intrusion"
Muhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Full textUgale, Archana R., and Amol D. Potgantwar. "Anomaly Based Intrusion Detection through Efficient Machine Learning Model." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 616–22. http://dx.doi.org/10.37391/ijeer.110251.
Full textJyoti, Snehi, Bhandari Abhinav, Baggan Vidhu, and Snehi Ritu Manish. "Diverse Methods for Signature based Intrusion Detection Schemes Adopted." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 44–49. https://doi.org/10.35940/ijrte.A2791.079220.
Full textProtić, Danijela, and Miomir Stanković. "Detection of Anomalies in the Computer Network Behaviour." European Journal of Engineering and Formal Sciences 4, no. 1 (2020): 7. http://dx.doi.org/10.26417/ejef.v4i1.p7-13.
Full textVerma, Anil, Enish Paneru, and Bishal Baaniya. "Anomaly-Based Network Intrusion Detection System." Journal of Lumbini Engineering College 4, no. 1 (2022): 38–42. http://dx.doi.org/10.3126/lecj.v4i1.49364.
Full textJIN, SHUYUAN, DANIEL S. YEUNG, and XIZHAO WANG. "INTERNET ANOMALY DETECTION BASED ON STATISTICAL COVARIANCE MATRIX." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 03 (2007): 591–606. http://dx.doi.org/10.1142/s0218001407005557.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textDissertations / Theses on the topic "Anomaly-based intrusion"
Satam, Shalaka Chittaranjan, and Shalaka Chittaranjan Satam. "Bluetooth Anomaly Based Intrusion Detection System." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/625890.
Full textBalupari, Ravindra. "Real-time network-based anomaly intrusion detection." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174579398.
Full textMiller, Nicholas J. "Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752128.
Full textAl-Nashif, Youssif. "MULTI-LEVEL ANOMALY BASED AUTONOMIC INTRUSION DETECTION SYSTEM." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/195504.
Full textLabonne, Maxime. "Anomaly-based network intrusion detection using machine learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS011.
Full textTjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Full textWester, Philip. "Anomaly-based intrusion detection using Tree Augmented Naive Bayes Classifier." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295754.
Full textNwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.
Find full textSöderström, Albin. "Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21870.
Full textZhou, Mian. "Network Intrusion Detection: Monitoring, Simulation and Visualization." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4063.
Full textBooks on the topic "Anomaly-based intrusion"
Nikolova, Evgeniya. The Decoding Algorithms as Techniques for Creation the Anomaly Based Intrusion Detection Systems. INTECH Open Access Publisher, 2009.
Find full textBook chapters on the topic "Anomaly-based intrusion"
Hu, Jiankun. "Host-Based Anomaly Intrusion Detection." In Handbook of Information and Communication Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_13.
Full textOoi, Shih Yin, Shing Chiang Tan, and Wooi Ping Cheah. "Anomaly Based Intrusion Detection through Temporal Classification." In Neural Information Processing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12643-2_74.
Full textViswanathan, Arun, Kymie Tan, and Clifford Neuman. "Deconstructing the Assessment of Anomaly-based Intrusion Detectors." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_15.
Full textLi, Zhuowei, Amitabha Das, and Jianying Zhou. "USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection." In Advances in Knowledge Discovery and Data Mining. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11430919_81.
Full textSuresh, Akshaya, and Arun Cyril Jose. "Detection of Malicious Activities by AI-Supported Anomaly-Based IDS." In Artificial Intelligence for Intrusion Detection Systems. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003346340-4.
Full textFragkiadakis, Alexandros G., Vasilios A. Siris, and Nikolaos Petroulakis. "Anomaly-Based Intrusion Detection Algorithms for Wireless Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13315-2_16.
Full textPrajapati, Gitesh, Pooja Singh, and Rahul. "Anomaly Based Network Intrusion Detection System for IoT." In Proceedings of International Conference on Data Science and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_49.
Full textMayanglambam, Sushilata D., Nainesh Hulke, and Rajendra Pamula. "Genetic Algorithm Based Anomaly Detection for Intrusion Detection." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-47224-4_17.
Full textKhonde, Shraddha R. "Anomaly Based Intrusion Detection System Using Rule Based Genetic Algorithm." In Intelligent Cyber Physical Systems and Internet of Things. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18497-0_56.
Full textSnehi, Jyoti, Abhinav Bhandari, Manish Snehi, Urvashi Tandon, and Vidhu Baggan. "Global Intrusion Detection Environments and Platform for Anomaly-Based Intrusion Detection Systems." In Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0733-2_58.
Full textConference papers on the topic "Anomaly-based intrusion"
Maasaoui, Zineb, Mheni Merzouki, Abdella Battou, and Ahmed Lbath. "Anomaly Based Intrusion Detection Using Large Language Models." In 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA). IEEE, 2024. https://doi.org/10.1109/aiccsa63423.2024.10912623.
Full textSinghvi, Arihant, Abhinav Nambiar, Pranav Menon, and Narendra V G. "SVM-Based Anomaly Detection for Network Intrusion Systems: An Advanced Approach to Intrusion Prevention." In First International Conference on Computer, Computation and Communication (IC3C-2025). River Publishers, 2025. https://doi.org/10.13052/rp-9788743808268a029.
Full textAl-Fuhaidi, Belal, Zainab Farae, Wedad Al-Sorori, et al. "Anomaly-Based Intrusion Detection System in WSN using DNN Algorithm." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777266.
Full textNguyen, Hoang-Cong-Thanh, Xuan-Ha Nguyen, and Kim-Hung Le. "An Automated Benchmarking Framework for Anomaly-based Intrusion Detection Systems." In 2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR). IEEE, 2024. http://dx.doi.org/10.1109/mapr63514.2024.10660867.
Full textNovikov, D., R. V. Yampolskiy, and L. Reznik. "Anomaly Detection Based Intrusion Detection." In Third International Conference on Information Technology: New Generations (ITNG'06). IEEE, 2006. http://dx.doi.org/10.1109/itng.2006.33.
Full textKumar, Roshan, and Deepak Sharma. "Signature-Anomaly Based Intrusion Detection Algorithm." In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018. http://dx.doi.org/10.1109/iceca.2018.8474781.
Full textWahi, Vibhore, Sarthak Yadav, Yash Thenuia, and Anamika Chauhan. "Anomaly Based Intrusion Detection For IoT." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9824810.
Full textAlmehmadi, Abdulaziz. "SCADA Networks Anomaly-based Intrusion Detection System." In SIN '18: 11th International Conference On Security Of Information and Networks. ACM, 2018. http://dx.doi.org/10.1145/3264437.3264471.
Full textSatam, Pratik. "Cross Layer Anomaly Based Intrusion Detection System." In 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2015. http://dx.doi.org/10.1109/sasow.2015.31.
Full textSatam, Pratik. "Anomaly Based Wi-Fi Intrusion Detection System." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.180.
Full textReports on the topic "Anomaly-based intrusion"
Skormin, Victor A. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada568124.
Full textEtoty, Renee E., and Robert F. Erbacher. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada601590.
Full text