To see the other types of publications on this topic, follow the link: Distributed intrusion detection system.

Books on the topic 'Distributed intrusion detection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 34 books for your research on the topic 'Distributed intrusion detection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Ning, Peng, Sushil Jajodia, and X. Sean Wang. Intrusion Detection in Distributed Systems. Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0467-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ning, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ingram, Dennis J. Autonomous agents for distributed intrusion detection in a multi-host environment. Naval Postgraduate School, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

C, Merrill Walter, Duyar Ahmet, and United States. National Aeronautics and Space Administration., eds. A distributed fault-detection and diagnosis system using on-line parameter estimation. National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

C, Merrill Walter, Duyar Ahmet, and United States. National Aeronautics and Space Administration., eds. A distributed fault-detection and diagnosis system using on-line parameter estimation. National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Spenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Markt-und-Technik-Verl., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

SHETTY, PRAVIN. DISTRIBUTED INTRUSION: Detection Systems. VDM Verlag Dr. Müller, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Network Security: Distributed Approach in Intrusion Detection System. Vyusta Ventures LLP, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ning, Peng, Sushil Jajodia, and Xiaoyang Sean Wang. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (Advances in Information Security). Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Carter, Earl. Cisco Secure Intrusion Detection System. Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Swartzbaugh, Richard Andrew. Internals of an Intrusion Detection System. Primedia eLaunch LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Instant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Marrinan, Jean. Remote Sensor Monitoring : the Home Intruder Detection System: Intrusion Detection. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Corchado, Emilio, and Álvaro Herrero. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Blokdyk, Gerardus. Intrusion Detection System a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Autonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment. Storming Media, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Diplomica Verlag, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Thomas Stein, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

(Editor), Gregory J. Kirmeyer, Melinda Friedman (Editor), Katherine Martel (Editor), et al., eds. Pathogen Intrusion into the Distribution System. American Water Works Association, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Rajendran, Praveen Kumar. Hybrid Intrusion Detection System for Private Cloud: From Research Perspective. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Toxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gondaliya, Tapan. Intrusion Detection System in Mobile Ad Hoc Network in Mac Layer. GRIN Verlag GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Moddi, Ms Shifali, Mr Harvinder singh, and Mr Sachin Kumar. GRID INTERFACED DISTRIBUTED GENERATION SYSTEM FOR POWER QUALITY IMPROVEMENT AND ISLANDING DETECTION. Independently published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

A distributed fault-detection and diagnosis system using on-line parameter estimation. National Aeronautics and Space Administration, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nils Otto vor dem gentschen Felde and Nils Otto Vor Dem Gentschen Felde. Ein föderiertes Intrusion Detection System für Grids: Dissertation an der Fakultät für Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universität München. Books on Demand GmbH, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretic
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!