Academic literature on the topic 'Host intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Host intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Host intrusion detection system"
Sagade, Omkar Dhananjay, Atharva Dnyaneshwar Ubhe, and Prof Prerna Siddharth Patil. "Host Based-Intrusion Detection System (Anomaly Detection System)." IOSR Journal of Computer Engineering 26, no. 6 (2024): 08–13. http://dx.doi.org/10.9790/0661-2606010813.
Full textMemon, Saifullah. "Host-based intrusion detection system using Support Vector Machine." Quaid-e-Awam University Research Journal of Engineering, Science & Technology 20, no. 1 (2022): 44–54. http://dx.doi.org/10.52584/qrj.2001.07.
Full textAmanYadav, Srivastav Abhishek, Tiwari Abhinandan, and Vir Singh Krishna. "Host-based Intrusion Detection System (HIDS)." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1043–49. https://doi.org/10.35940/ijeat.E9903.069520.
Full textTao, Ran, Li Yang, Lu Peng, and Bin Li. "A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections." International Journal of Information Security and Privacy 4, no. 1 (2010): 18–31. http://dx.doi.org/10.4018/jisp.2010010102.
Full textLiu, Ming, Zhi Xue, Xianghua Xu, Changmin Zhong, and Jinjun Chen. "Host-Based Intrusion Detection System with System Calls." ACM Computing Surveys 51, no. 5 (2019): 1–36. http://dx.doi.org/10.1145/3214304.
Full textSharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.
Full textProf. M. V. Desai, Priya B. Bhosle. "Intrusion Detection System with Deceptive Virtual Host." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (2015): 6432–41. http://dx.doi.org/10.15680/ijircce.2015.0307011.
Full textKukushkina, Nadezhda, and Aleksey Novokhrestov. "Development of the laboratory bench for studying intrusion detection systems." Digital technology security, no. 4 (December 27, 2021): 37–53. http://dx.doi.org/10.17212/2782-2230-2021-4-37-53.
Full textJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Full textRatih Hafsarah Maharrani. "Enhancing Performance Using New Hybrid Intrusion Detection System." Proceeding of The International Conference on Economics and Business 1, no. 1 (2022): 13–15. http://dx.doi.org/10.55606/iceb.v1i1.101.
Full textDissertations / Theses on the topic "Host intrusion detection system"
Molina, Jesus. "Evaluating host intrusion detection systems." College Park, Md.: University of Maryland, 2007. http://hdl.handle.net/1903/7697.
Full textMcDonald, Kevin E. (Kevin Edward) 1978. "A lightweight real-time host-based intrusion detection system." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86677.
Full textYun, Ronald E. "Network defense-in-dept : evaluating host-based intrusion detection systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA395808.
Full textPayne, Bryan D. "Improving host-based computer security using secure active monitoring and memory analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34852.
Full textUppströmer, Viktor, and Henning Råberg. "Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18337.
Full textJacoby, Grant Arthur. "Battery-Based Intrusion Detection." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/27092.
Full textAbimbola, Abiola. "NetHostSensor Enhancing intrusion detection via an active target host." Thesis, Edinburgh Napier University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506365.
Full textSainani, Varsha. "Hybrid Layered Intrusion Detection System." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/44.
Full textMaharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.
Full textSonbul, O., M. Byamukama, S. Alzebda, and A. N. Kalashnikov. "Autonomous intrusion detection information system." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28777.
Full textBooks on the topic "Host intrusion detection system"
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textIngram, Dennis J. Autonomous agents for distributed intrusion detection in a multi-host environment. Naval Postgraduate School, 1999.
Find full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer Berlin Heidelberg, 2011.
Find full textBarrus, Joseph D. Intrusion detection in real-time in a multi-node, multi-host environment. Naval Postgraduate School, 1997.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Markt-und-Technik-Verl., 2003.
Find full textLhotsky, Brad. Instant OSSEC Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textInstant Ossec Host-Based Intrusion Detection System. Packt Publishing, Limited, 2013.
Find full textNetwork Defense-in-Depth: Evaluating Host-Based Intrusion Detection Systems. Storming Media, 2001.
Find full textOSSEC Host-Based Intrusion Detection Guide. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-240-9.x0001-4.
Full textBook chapters on the topic "Host intrusion detection system"
Deshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. "A Host-Based Intrusion Detection System." In Studies in Big Data. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3_2.
Full textGautam, Sunil Kumar, and Hari Om. "Host-Based Intrusion Detection Using Statistical Approaches." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2695-6_40.
Full textGayathri Harshitha, Ch, M. Kameswara Rao, and P. Neelesh Kumar. "A Novel Mechanism for Host-Based Intrusion Detection System." In First International Conference on Sustainable Technologies for Computational Intelligence. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_42.
Full textPrasad, Vivek Kumar, A. Raval Abhishek, and Madhuri Bhavsar. "HIDSC2: Host-Based Intrusion Detection System in Cloud Computing." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-4960-9_6.
Full textYedukondalu, G., J. Anand Chandulal, and M. Srinivasa Rao. "Host-Based Intrusion Detection System Using File Signature Technique." In Innovations in Computer Science and Engineering. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_25.
Full textLi, Hao, Zehui Wang, Shang Shang, et al. "Joint Spatial-Temporal Representation for Host Intrusion Detection System." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-97632-2_18.
Full textPáez, Rafael, Joan Tomàs-Buliart, Jordi Forné, and Miguel Soriano. "Securing Agents against Malicious Host in an Intrusion Detection System." In Critical Information Infrastructures Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89173-4_9.
Full textChawla, Ashima, Brian Lee, Sheila Fallon, and Paul Jacob. "Host Based Intrusion Detection System with Combined CNN/RNN Model." In ECML PKDD 2018 Workshops. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13453-2_12.
Full textEl Jaouhari, Saad, Andrei Vavilov, Julia Soloveva, Alexandru Archip, and Nour El Madhoun. "MIDPS: A Multi-agent Host Intrusion Detection and Prevention System." In Lecture Notes on Data Engineering and Communications Technologies. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87772-8_22.
Full textCan, Ozgu, Murat Osman Unalir, Emine Sezer, Okan Bursa, and Batuhan Erdogdu. "An Ontology Based Approach for Host Intrusion Detection Systems." In Metadata and Semantic Research. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70863-8_8.
Full textConference papers on the topic "Host intrusion detection system"
Alla, Omayma, and Stéphane Mocanu. "Host-Based Intrusion Detection for Industrial Control Systems." In 2025 IEEE 11th International Conference on Network Softwarization (NetSoft). IEEE, 2025. https://doi.org/10.1109/netsoft64993.2025.11080639.
Full textTaha, Ahmed, and Pabitra Kumar Roy. "Improvising Host-Based Intrusion Detection Systems by Integrating Open-Source Tools." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895713.
Full textVyas, Abhishek, Po-Ching Lin, and Ren-Hung Hwang. "FedSplit-HIDS: A Host-Based Intrusion Detection Framework for Heterogeneous Industrial IoT Environments." In 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2024. https://doi.org/10.1109/ants63515.2024.10898417.
Full textNam, Yujin, Rachel King, Quinn Burke, Minxuan Zhou, Patrick McDaniel, and Tajana Rosing. "Efficient Host Intrusion Detection using Hyperdimensional Computing." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825247.
Full textVazquez, B. J., K. D. Boomer, T. J. Venetz, and J. K. Engeman. "241-AY-102 Leak Detection Pit Drain Line Inspection." In CORROSION 2015. NACE International, 2015. https://doi.org/10.5006/c2015-06198.
Full textPraveen, Siriki Jyothi, Vulsa Prahladh, and B. S. Kiruthika Devi. "Host-based Intrusion Detection Framework for IoT using Machine Learning." In 2025 7th International Conference on Inventive Material Science and Applications (ICIMA). IEEE, 2025. https://doi.org/10.1109/icima64861.2025.11074165.
Full textVokorokos, L., and A. Balaz. "Host-based intrusion detection system." In 2010 IEEE 14th International Conference on Intelligent Engineering Systems (INES 2010). IEEE, 2010. http://dx.doi.org/10.1109/ines.2010.5483815.
Full textSayed, Mahmoud Abdelhafeez, and Mostafa Taha. "Oblivious Intrusion Detection System." In 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2022. http://dx.doi.org/10.1109/host54066.2022.9840140.
Full textLiu, Jiannan, Kun Xiao, Lei Luo, Yun Li, and Lirong Chen. "An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2020. http://dx.doi.org/10.1109/qrs51102.2020.00028.
Full textCastanhel, Gabriel Ruschel, Tiago Heinrich, Fabrício Ceschin, and Carlos A. Maziero. "Sliding Window: The Impact of Trace Size in Anomaly Detection System for Containers Through Machine Learning." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15203.
Full textReports on the topic "Host intrusion detection system"
Marsh, Kennedy, Piyush Sabharwall, and Palash Bhowmik. Integrating PCTRAN with AI-Driven Host-Intrusion Detection and Secured Container Systems for Advanced Malware Analysis. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2448404.
Full textDRAELOS, TIMOTHY J., MICHAEL J. COLLINS, DAVID P. DUGGAN, EDWARD V. THOMAS, and DONALD WUNSCH. Experiments on Adaptive Techniques for Host-Based Intrusion Detection. Office of Scientific and Technical Information (OSTI), 2001. http://dx.doi.org/10.2172/787645.
Full textSchmid, Matthew. Computing Platform Coverage via Light Host-based Intrusion Detection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402859.
Full textLundy, Philip A., George W. Pittman, and Heinz J. Pletsch. Intrusion Detection System Methodology Investigation. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada198210.
Full textZage, Dolores M., and Wayne M. Zage. Intrusion Detection System Visualization of Network Alerts. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada532723.
Full textSingh, Abhinav. Distributed Intrusion Detection System for Modbus Protocol. Iowa State University, 2020. http://dx.doi.org/10.31274/cc-20240624-562.
Full textSpeed, Ann. Intrusion Detection System Alarm Station Operator Interface Improvements. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1762330.
Full textHeady, R., G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/425295.
Full textSkormin, Victor A. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada568124.
Full textChen, Yan. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1108982.
Full text