Dissertations / Theses on the topic 'Anomaly-based intrusion'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 dissertations / theses for your research on the topic 'Anomaly-based intrusion.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Satam, Shalaka Chittaranjan, and Shalaka Chittaranjan Satam. "Bluetooth Anomaly Based Intrusion Detection System." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/625890.
Full textBalupari, Ravindra. "Real-time network-based anomaly intrusion detection." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174579398.
Full textMiller, Nicholas J. "Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752128.
Full textAl-Nashif, Youssif. "MULTI-LEVEL ANOMALY BASED AUTONOMIC INTRUSION DETECTION SYSTEM." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/195504.
Full textLabonne, Maxime. "Anomaly-based network intrusion detection using machine learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS011.
Full textTjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Full textWester, Philip. "Anomaly-based intrusion detection using Tree Augmented Naive Bayes Classifier." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295754.
Full textNwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.
Find full textSöderström, Albin. "Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21870.
Full textZhou, Mian. "Network Intrusion Detection: Monitoring, Simulation and Visualization." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4063.
Full textMikhail, Joseph W. "An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10977908.
Full textKazi, Shehab. "Anomaly based Detection of Attacks on Security Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4806.
Full textTaylor, Adrian. "Anomaly-Based Detection of Malicious Activity in In-Vehicle Networks." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36120.
Full textJadidi, Zahra. "Flow-based Anomaly Detection in High-Speed Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367890.
Full textAzumah, Sylvia w. "Deep Learning -Based Anomaly Detection System for Guarding Internet of Things Devices." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1624917874580953.
Full textMathur, Nitin O. "Application of Autoencoder Ensembles in Anomaly and Intrusion Detection using Time-Based Analysis." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161374876195402.
Full textArdolino, Kyle R. "Semi-supervised learning of bitmask pairs for an anomaly-based intrusion detection system." Diss., Online access via UMI:, 2008.
Find full textZhu, Xuejun. "Anomaly Detection Through Statistics-Based Machine Learning For Computer Networks." Diss., Tucson, Arizona : University of Arizona, 2006. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1481%5F1%5Fm.pdf&type=application/pdf.
Full textAl, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.
Full textSalem, Maher [Verfasser]. "Adaptive Real-time Anomaly-based Intrusion Detection using Data Mining and Machine Learning Techniques / Maher Salem." Kassel : Universitätsbibliothek Kassel, 2014. http://d-nb.info/1060417847/34.
Full textHyla, Bret M. "Sample Entropy and Random Forests a methodology for anomaly-based intrusion detection and classification of low-bandwidth malware attacks /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHyla.pdf.
Full textGill, Rupinder S. "Intrusion detection techniques in wireless local area networks." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/29351/1/Rupinder_Gill_Thesis.pdf.
Full textGill, Rupinder S. "Intrusion detection techniques in wireless local area networks." Queensland University of Technology, 2009. http://eprints.qut.edu.au/29351/.
Full textSoysal, Murat. "A Novel Method For The Detection Of P2p Traffic In The Network Backbone Inspired By Intrusion Detection Systems." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/3/12607315/index.pdf.
Full textCaulkins, Bruce. "SESSION-BASED INTRUSION DETECTION SYSTEM TO MAP ANOMALOUS NETWORK TRAFFIC." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3466.
Full textLi, Zhe. "A Neural Network Based Distributed Intrusion Detection System on Cloud Platform." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1364835027.
Full textSawant, Ankush. "Time-based Approach to Intrusion Detection using Multiple Self-Organizing Maps." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113833809.
Full textAl, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.
Full textThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textGu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.
Full textZheng, Erkang. "Interactive assistance for anomaly-based intrusion detection." 2004. http://www.lib.ncsu.edu/theses/available/etd-04162004-150145/unrestricted/etd.pdf.
Full textPhani, B. "Applications Of Machine Learning To Anomaly Based Intrusion Detection." Thesis, 2006. https://etd.iisc.ac.in/handle/2005/391.
Full textPhani, B. "Applications Of Machine Learning To Anomaly Based Intrusion Detection." Thesis, 2006. http://hdl.handle.net/2005/391.
Full textHelmrich, Daniel. "Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects." 2021. https://ul.qucosa.de/id/qucosa%3A75385.
Full textHieb, Jeff. "Anomaly based intrusion detection for network monitoring using a dynamic honeypot." 2004. http://etd.louisville.edu/data/UofL0067t2004.pdf.
Full textKang, Inho. "Differentiated Intrusion Detection and SVDD-based Feature Selection for Anomaly Detection." 2007. http://trace.tennessee.edu/utk_graddiss/206.
Full textTeixeira, Jorge Amílcar Lopes. "Network traffic sampling for improved signature and anomaly based intrusion detection." Master's thesis, 2008. http://hdl.handle.net/10216/58365.
Full textTeixeira, Jorge Amílcar Lopes. "Network traffic sampling for improved signature and anomaly based intrusion detection." Dissertação, 2008. http://hdl.handle.net/10216/58365.
Full textNwamuo, Onyekachi. "Hypervisor-based cloud anomaly detection using supervised learning techniques." Thesis, 2020. http://hdl.handle.net/1828/11503.
Full textLin, Shih-Chieh, and 林世杰. "A Study of Intrusion Detection System Based on Anomaly Detection in Windows Environment." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/50284166653456932652.
Full textHuang, Cheng-Pin, and 黃程斌. "Clustering-based Techniques for Anomaly Detection in Intrusion Detection System: a Comparative Study." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/13013469783308921078.
Full textKuo, Yen-Feng, and 郭彥鋒. "The implementation of A Network Intrusion Detection System Based on Anomaly Data Stream Mining." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/15210171209583186891.
Full textDalmazo, Bruno Lopes. "A Prediction-based Approach for Anomaly Detection in the Cloud." Doctoral thesis, 2018. http://hdl.handle.net/10316/81235.
Full textLiu, Lei, X. L. Jin, Geyong Min, and L. Xu. "Anomaly diagnosis based on regression and classification analysis of statistical traffic features." 2013. http://hdl.handle.net/10454/10727.
Full textTan, Z. "Detection of denial-of-service attacks based on computer vision techniques." Thesis, 2013. http://hdl.handle.net/10453/24176.
Full textLu, Wei. "Unsupervised anomaly detection framework for multiple-connection based network intrusions." Thesis, 2005. http://hdl.handle.net/1828/1949.
Full textZielinski, Marek Piotr. "Applying mobile agents in an immune-system-based intrusion detection system." Diss., 2004. http://hdl.handle.net/10500/1918.
Full text