Journal articles on the topic 'Distributed intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Distributed intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ujeniya, A. A., R. D. Pawar, S. A. Sonawane, S. B. Shingade, and S. R. Khonde. "Hybrid Distributed Intrusion Detection System." International Journal of Computer Sciences and Engineering 6, no. 12 (2018): 232–37. http://dx.doi.org/10.26438/ijcse/v6i12.232237.
Full textHong, Bo, Hui Wang, and Zijian Cao. "An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment." Wireless Communications and Mobile Computing 2021 (October 19, 2021): 1–9. http://dx.doi.org/10.1155/2021/2716881.
Full textA. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textRiyad, A. M., S. Irfan Ahmed M., and L. Raheemaa Khan R. "An adaptive distributed intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951–60. https://doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textShrikant, Vanve* Prof. Sarita Patil. "OGEDIDS: OPPOSITIONAL GENETIC PROGRAMMING ENSEMBLE FOR DISTRIBUTED INTRUSION DETECTION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 756–62. https://doi.org/10.5281/zenodo.57737.
Full textKaur, Avneet, Shruti Pawar, Neha Jore, Varsha Chavan, and Nikita Mule. "Intrusion Detection System using Blockchain." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 569–71. http://dx.doi.org/10.22214/ijraset.2024.58361.
Full textSeyedeh, Yasaman Rashida. "HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 45–54. https://doi.org/10.5281/zenodo.4267213.
Full textXie, Ping, and Wei Wang. "The Study and Simulation on Campus Network Intrusion Detection System." Advanced Materials Research 490-495 (March 2012): 2657–61. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.2657.
Full textManikandan, Deepa, and Jayaseelan Dhilipan. "Machine learning approach for intrusion detection system using dimensionality reduction." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 1 (2024): 430. http://dx.doi.org/10.11591/ijeecs.v34.i1.pp430-440.
Full textManikandan, Deepa, and Jayaseelan Dhilipan. "Machine learning approach for intrusion detection system using dimensionality reduction." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 1 (2024): 430–40. https://doi.org/10.11591/ijeecs.v34.i1.pp430-440.
Full textKhonde, Shraddh, and Ulagamuthalvi Venugopal. "Hybrid Architecture for Distributed Intrusion Detection System." Ingénierie des systèmes d information 24, no. 1 (2019): 19–28. http://dx.doi.org/10.18280/isi.240102.
Full textLiuHui and Liu Songhua. "Distributed Firewall with Intrusion Detection System Techniques." Advanced Science Letters 19, no. 11 (2013): 3297–300. http://dx.doi.org/10.1166/asl.2013.5139.
Full textLuo, Ke. "A distributed SDN-based intrusion detection system for IoT using optimized forests." PLOS ONE 18, no. 8 (2023): e0290694. http://dx.doi.org/10.1371/journal.pone.0290694.
Full textHofmeyr, Steven A., and Stephanie Forrest. "Architecture for an Artificial Immune System." Evolutionary Computation 8, no. 4 (2000): 443–73. http://dx.doi.org/10.1162/106365600568257.
Full textGondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.
Full textGanapathy, S., P. Yogesh, and A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM." Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.
Full textÖzalp, Murat, Cihan Karakuzu, and Ahmet Zengin. "Distributed Intrusion Detection Systems: A Survey." Academic Perspective Procedia 2, no. 3 (2019): 400–407. http://dx.doi.org/10.33793/acperpro.02.03.18.
Full textGrzech, Adam Piotr. "Optimal monitoring system for a distributed intrusion detection system." Artificial Life and Robotics 14, no. 4 (2009): 453–56. http://dx.doi.org/10.1007/s10015-009-0740-8.
Full textTang, Qian Jun, Yan Zhang, and Yong Ju Li. "A Case Study of Distributed Network Fault Detection Technology in Distance Education." Advanced Materials Research 760-762 (September 2013): 1282–87. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1282.
Full textLiu, Yang Bin, Liang Shi, Bei Zhan Wang, Yuan Qin Wu, and Pan Hong Wang. "An New Agent Based Distributed Adaptive Intrusion Detection System." Advanced Materials Research 532-533 (June 2012): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.624.
Full textJaiswal, Ms Rashmi, and Ms Chandramala Amarji. "A Distributed Intrusion Detection System for AODV Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1576–86. http://dx.doi.org/10.22214/ijraset.2022.46247.
Full textKumar, Aravendra. "Distributed Intrusion Detection System for Wireless Sensor Networks." IOSR Journal of Computer Engineering 14, no. 1 (2013): 61–70. http://dx.doi.org/10.9790/0661-1416170.
Full textHUANG, Wen-wen. "Communication mechanism designed for distributed intrusion detection system." Journal of Computer Applications 28, no. 4 (2008): 843–45. http://dx.doi.org/10.3724/sp.j.1087.2008.00843.
Full textAbraham, Ajith, Ravi Jain, Johnson Thomas, and Sang Yong Han. "D-SCIDS: Distributed soft computing intrusion detection system." Journal of Network and Computer Applications 30, no. 1 (2007): 81–98. http://dx.doi.org/10.1016/j.jnca.2005.06.001.
Full textKe, Yun, and Yan Li. "Distributed Intrusion Detection and Research of Fragment Attack Based-on IPv6." Advanced Materials Research 268-270 (July 2011): 1797–801. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1797.
Full textSharma, Vishwas, Dharmesh Shah, Sachin Sharma, and Sunil Gautam. "Artificial Intelligence based Intrusion Detection System – A Detailed Survey." ITM Web of Conferences 65 (2024): 04002. http://dx.doi.org/10.1051/itmconf/20246504002.
Full textJasmin Salma, S., and B. Aysha Banu. "Revealing of Reducing Manners in Ad Hoc Networks with Crosslayer Approach Using SVM and FDA in Distributed Architecture." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 76–79. http://dx.doi.org/10.51983/ajcst-2012.1.1.1666.
Full textGupta, Piyush. "Federated Learning for Distributed Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1942–45. https://doi.org/10.22214/ijraset.2025.70578.
Full textJoseph, Jennifer E., Ngozi Tracy Aleke, and Onyinyechukwu Prisca Onyeanisi. "Deep Learning Based Intrusion Detection System for Network Security in IoT System." International Journal of Education, Management, and Technology 3, no. 1 (2025): 119–38. https://doi.org/10.58578/ijemt.v3i1.4539.
Full textZhang, Hanqing. "Distributed Intrusion Detection Model in Wireless Sensor Network." International Journal of Online Engineering (iJOE) 11, no. 9 (2015): 61. http://dx.doi.org/10.3991/ijoe.v11i9.5067.
Full textEt. al., T. Sushma,. "A Review of the cluster based Mobile Adhoc Network Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2070–76. http://dx.doi.org/10.17762/turcomat.v12i2.1811.
Full textElmasry, Wisam, Akhan Akbulut, and Abdul Halim Zaim. "A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service." Open Computer Science 11, no. 1 (2021): 365–79. http://dx.doi.org/10.1515/comp-2020-0214.
Full textChen, Rong. "Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment." Computational Intelligence and Neuroscience 2022 (June 29, 2022): 1–7. http://dx.doi.org/10.1155/2022/4720169.
Full textAwajan, Albara. "A Novel Deep Learning-Based Intrusion Detection System for IoT Networks." Computers 12, no. 2 (2023): 34. http://dx.doi.org/10.3390/computers12020034.
Full textKumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Full textAmjad, Amjad, Nizar Alhafez, and Iyad Al Al-khayat. "An adaptive distributed intrusion detection system in local network: Hybrid classification methods." Journal of Intelligent Systems and Internet of Things 12, no. 1 (2024): 129–43. http://dx.doi.org/10.54216/jisiot.120110.
Full textZeng, Yiming, Jianwei Zhang, Yuzhong Zhong, Lin Deng, and Maoning Wang. "STNet: A Time-Frequency Analysis-Based Intrusion Detection Network for Distributed Optical Fiber Acoustic Sensing Systems." Sensors 24, no. 5 (2024): 1570. http://dx.doi.org/10.3390/s24051570.
Full textKorani, Ravinder, and Dr P. Chandra Sekhar Reddy. "Anomaly based Intrusion Detection by Heuristics to Predict Intrusion Scope of IOT Network Transactions." International Journal of Engineering & Technology 7, no. 2.7 (2018): 797. http://dx.doi.org/10.14419/ijet.v7i2.7.10982.
Full textAISHWARYA.S, CHITRA.M, MRS.M.VIVEKA, and PRIYA NIVETHA. "APPROACHES OF DATAMINING IN NETWORK INTRUSION DETECTION SYSTEM." International Journal of Advances in Engineering & Scientific Research 1, no. 5 (2014): 129–34. https://doi.org/10.5281/zenodo.10725167.
Full textPlatonov, V. V., and P. O. Semenov. "An adaptive model of a distributed intrusion detection system." Automatic Control and Computer Sciences 51, no. 8 (2017): 894–98. http://dx.doi.org/10.3103/s0146411617080168.
Full textRenjit .J, Arokia, and Shunmuganathan K.L. "DISTRIBUTED ANOMALY INTRUSION DETECTION SYSTEM BASED ON MULTI-AGENTS." International Journal on Information Sciences and Computing 5, no. 1 (2011): 7–12. http://dx.doi.org/10.18000/ijisac.50084.
Full textShan, Guohou, Boxin Zhao, James R. Clavin, Haibin Zhang, and Sisi Duan. "Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System." IEEE Transactions on Information Forensics and Security 17 (2022): 28–41. http://dx.doi.org/10.1109/tifs.2021.3131026.
Full textXin Li, Wenjie Wang, Jingchun Li, Xuefeng Zheng, and Shaojie Wang. "Improving The Communication Resiliency of Distributed Intrusion Detection System." Journal of Convergence Information Technology 7, no. 21 (2012): 550–58. http://dx.doi.org/10.4156/jcit.vol7.issue21.66.
Full textWang, Jin. "An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System." Journal of Computer Research and Development 42, no. 11 (2005): 1934. http://dx.doi.org/10.1360/crad20051116.
Full textRenjit, J. Arokia. "Distributed and cooperative multi-agent based intrusion detection system." Indian Journal of Science and Technology 3, no. 10 (2010): 1070–74. http://dx.doi.org/10.17485/ijst/2010/v3i10.2.
Full textChenniappanadar, Santhosh Kumar, Sundharamurthy Gnanamurthy, Vinoth Kumar Sakthivelu, and Vishnu Kumar Kaliappan. "A Supervised Machine Learning Based Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 3 (2022): 16–25. http://dx.doi.org/10.17762/ijcnis.v14i3.5567.
Full textCepheli, Özge, Saliha Büyükçorak, and Güneş Karabulut Kurt. "Hybrid Intrusion Detection System for DDoS Attacks." Journal of Electrical and Computer Engineering 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/1075648.
Full textLevy Rocha, Savio, Fabio Lucio Lopes de Mendonca, Ricardo Staciarini Puttini, Rafael Rabelo Nunes, and Georges Daniel Amvame Nze. "DCIDS—Distributed Container IDS." Applied Sciences 13, no. 16 (2023): 9301. http://dx.doi.org/10.3390/app13169301.
Full textJerzak, Marcin, and Mariusz Wojtysiak. "Distributed Intrusion Detection Systems – MetalDS case study." Computational Methods in Science and Technology Special Issue, no. 1 (2010): 133–45. http://dx.doi.org/10.12921/cmst.2010.si.01.135-145.
Full text