Journal articles on the topic 'Ids/ips'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ids/ips.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bharti, Shubham. "Intrusion detection and prevention systems (IDS/IPS) for OS protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31718.
Full textAng, Sokroeurn, Sopheaktra Huy, and Midhunchakkaravarthy Janarthanan. "Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 77–88. https://doi.org/10.63180/jcsra.thestap.2025.3.10.
Full textTaufik, Rahman Ilham Rozen. "Strategi Penguatan Keamanan Jaringan dengan IDS dan IPS di PT. Toppan Plasindo Lestari Cibitung." TEKNIKA 19, no. 1 (2024): 249–59. https://doi.org/10.5281/zenodo.14195077.
Full textPopkov, Gleb. "APPLICATION OF SIEM SOLUTIONS ON MULTI-SERVICE COMMUNICATIONS NETWORKS." Interexpo GEO-Siberia 9 (2019): 61–65. http://dx.doi.org/10.33764/2618-981x-2019-9-61-65.
Full textPapadaki, Maria, and Steven Furnell. "IDS or IPS: what is best?" Network Security 2004, no. 7 (2004): 15–19. http://dx.doi.org/10.1016/s1353-4858(04)00106-0.
Full textDulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Full textKorzachenko, Olha, and Vladyslav Poltorak. "IDS/IPS selection methodological principles for organisations." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 135–46. http://dx.doi.org/10.33111/mise.98.14.
Full textKarambelkar, Mr Apoorva. "Next Generation Firewall using IPS & IDS." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2868–74. https://doi.org/10.22214/ijraset.2025.68804.
Full textNadeykina, Victoria Sergeevna, and Maria Aleksandrovna Maslova. "Analysis of open-source intrusion detection and prevention systems for integration with Russian operating systems." Research result. Information technologies 9, no. 2 (2024): 41–48. http://dx.doi.org/10.18413/2518-1092-2024-9-2-0-5.
Full textGómez Castaño, Julio César, Néstor Jaime Castaño Pérez, and Luis Carlos Correa Ortiz. "Sistemas de detección y prevención de intrusos." Ciencia e Ingeniería Neogranadina 33, no. 1 (2023): 75–86. http://dx.doi.org/10.18359/rcin.6534.
Full textSamsumar, Lalu Delsi, Bahtiar Imran, Muhamad Masjun Efendi, Rudi Muslim, Zumratul Muahidin, and Zaenul Mutaqin. "Optimalisasi Keamanan Web Server Ubuntu dengan Teknologi IPS Berbasis Iptables." JTERA (Jurnal Teknologi Rekayasa) 9, no. 2 (2024): 69. https://doi.org/10.31544/jtera.v9.i2.2024.69-76.
Full textSafana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.
Full textAwal, Hasri. "Implementasi Intrusion Detection Prevention System Sebagai Sistem Keamanan Jaringan Komputer Kejaksaan Negeri Pariaman Menggunkan Snort Dan Iptables Berbasis Linux." Jurnal Sains Informatika Terapan 2, no. 1 (2023): 38–44. http://dx.doi.org/10.62357/jsit.v2i1.184.
Full textBognár, Eszter Katalin. "Data Mining in Cyber Threat Analysis : Neural Networks for Intrusion Detection." Academic and Applied Research in Military and Public Management Science 15, no. 2 (2016): 187–96. http://dx.doi.org/10.32565/aarms.2016.2.7.
Full textWidiyanto, Wahyu Wijaya. "SIMRS Network Security Simulation Using Snort IDS and IPS Methods." Indonesian of Health Information Management Journal (INOHIM) 10, no. 1 (2022): 10–17. http://dx.doi.org/10.47007/inohim.v10i1.396.
Full textSantoso, Joko Dwi. "Keamanan Jaringan Menggunakan IDS/IPS Strataguard sebagai Layanan Kemanan Jaringan Terpusat." SATIN - Sains dan Teknologi Informasi 3, no. 2 (2019): 56–68. http://dx.doi.org/10.33372/stn.v3i2.271.
Full textSeok, Jinug, Moonseok Choi, Jimyung Kim, and Jonsung Park. "A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata." Journal of the Korea Society of Digital Industry and Information Management 12, no. 1 (2016): 89–95. http://dx.doi.org/10.17662/ksdim.2016.12.1.089.
Full textNugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.
Full textSafana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.
Full textGuo, Jian, Hua Guo, and Zhong Zhang. "Research on High Performance Intrusion Prevention System Based on Suricata." Highlights in Science, Engineering and Technology 7 (August 3, 2022): 238–45. http://dx.doi.org/10.54097/hset.v7i.1077.
Full textKorcak, Michal, Jaroslav Lamer, and Frantisek Jakab. "Intrusion Prevention/Intrusion Detection System (IPS/IDS) for Wifi Networks." International journal of Computer Networks & Communications 6, no. 4 (2014): 77–89. http://dx.doi.org/10.5121/ijcnc.2014.6407.
Full textPantoja, Maria. "A High Granularity Approach to NetworkPacket Processing for Latency-TolerantApplications with CUDA (Corvyd)." ACI Avances en Ciencias e Ingenierías 13, no. 2 (2021): 7. http://dx.doi.org/10.18272/aci.v13i2.2142.
Full textKhan, Nizam. "SDCS Agent on Veritas NetBackup Appliances Code Upgrade." International Journal of Computer Science and Mobile Computing 13, no. 3 (2024): 57–68. http://dx.doi.org/10.47760/ijcsmc.2024.v13i03.006.
Full textWahyudi, Farid, and Listanto Tri Utomo. "Perancangan Security Network Intrusion Prevention System Pada PDTI Universitas Islam Raden Rahmat Malang." Edumatic: Jurnal Pendidikan Informatika 5, no. 1 (2021): 60–69. http://dx.doi.org/10.29408/edumatic.v5i1.3278.
Full textKurniawan, Rifky, and Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan." SENTINEL 3, no. 1 (2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.
Full textPatel, Arpita D. "Vulnerability Signatures with Application Classification & Performance Enhancement for IDS/IPS." International Journal for Research in Applied Science and Engineering Technology V, no. X (2017): 385–94. http://dx.doi.org/10.22214/ijraset.2017.10056.
Full textSeshu Kumar, A. N., R. Kumar Yadav, and N. S. Raghava. "A COMPREHENSIVE OUTLINE OF DIVERSE IDS/IPS WITH RESPECT TO HYPERVISORS." Advances in Mathematics: Scientific Journal 9, no. 6 (2020): 3539–50. http://dx.doi.org/10.37418/amsj.9.6.33.
Full textGusrion, Deval, Silky Safira, Retno Devita, Ruri Hartika Zain, and Rini Sovia. "DESIGN OF PRIVATE CLOUD STORAGE USING SECURITY METHODS IDS AND IPS." Jurnal Ipteks Terapan 15, no. 4 (2021): 461–65. http://dx.doi.org/10.22216/jit.v15i4.725.
Full textThanuja, R., and A. Umamakeswari. "Black hole detection using evolutionary algorithm for IDS/IPS in MANETs." Cluster Computing 22, S2 (2018): 3131–43. http://dx.doi.org/10.1007/s10586-018-2006-5.
Full textZafar, M. F., F. Naheed, Z. Ahmad, and M. M. Anwar. "NETWORK SECURITY: A SURVEY OF MODERN APPROACHES." Nucleus 45, no. 1-2 (2020): 11–31. https://doi.org/10.71330/nucleus.45.01-2.994.
Full textHarja, Danaswara Prawira, Andrian Rakhmatsyah, and Muhammad Arief Nugroho. "Implementasi untuk Meningkatkan Keamanan Jaringan Menggunakan Deep Packet Inspection pada Software Defined Networks." Indonesian Journal on Computing (Indo-JC) 4, no. 1 (2019): 133. http://dx.doi.org/10.21108/indojc.2019.4.1.286.
Full textRozendaal, Kyle, Thivanka Dissanayake-Mohottalalage, and Akalanka Mailewa. "Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks." International Journal of Computer Applications 184, no. 12 (2022): 21–28. http://dx.doi.org/10.5120/ijca2022922098.
Full textKhadafi, Shah, Yuni Dian Pratiwi, and Enggar Alfianto. "KEAMANAN FTP SERVER BERBASISKAN IDS DAN IPS MENGGUNAKAN SISTEM OPERASI LINUX UBUNTU." Network Engineering Research Operation 6, no. 1 (2021): 11. http://dx.doi.org/10.21107/nero.v6i1.190.
Full textSangeetha, S. K. B., and Nazreen Banu A. "Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment." Computers, Materials & Continua 82, no. 1 (2025): 579–607. https://doi.org/10.32604/cmc.2024.059805.
Full textBorchmann, Peter, Helen Goergen, Carsten Kobe, et al. "Early Interim PET in Patients with Advanced-Stage Hodgkin's Lymphoma Treated within the Phase 3 GHSG HD18 Study." Blood 130, Suppl_1 (2017): 737. http://dx.doi.org/10.1182/blood.v130.suppl_1.737.737.
Full textД.А., Кирин, та Сааков В.В. "МЕТОДЫ И ПРОГРАММНО-АППАРАТНЫЕ СРЕДСТВА ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА В СЕТИ ИНТЕРНЕТ". ИННОВАЦИОННЫЕ НАУЧНЫЕ ИССЛЕДОВАНИЯ 9-1(11) (27 вересня 2021): 31–37. https://doi.org/10.5281/zenodo.5529292.
Full textЛЕМЕШКО, Андрій Вікторович, Ольга Миколаївна ТКАЧЕНКО, Артем Васильович АНТОНЕНКО та Микола Анатолійович ЛЯШУК. "ВПРОВАДЖЕННЯ ПРИСТРОЇВ І СИСТЕМ ДЛЯ ПІДВИЩЕННЯ ЗАХИСТУ МЕРЕЖЕВОЇ ІНФРАСТРУКТУРИ ПРИВАТНИХ ПІДПРИЄМСТВ". ITSynergy, № 2 (31 грудня 2024): 42–56. https://doi.org/10.53920/its-2024-2-3.
Full textRakhimov, Bakhtiyorjon Nematovich, and Alevtina Aleksandrovna Muradova. "HARDWARE AND SOFTWARE PROTECTION MEANS OF PROTECTION OF CYBER ATTACKS OF INTERNET OF THINGS DEVICES." RESEARCH AND EDUCATION 3, no. 4 (2024): 11–17. https://doi.org/10.5281/zenodo.11109048.
Full textSpohr, Ana Maria, Gilberto Antonio Borges, and Jeffrey A. Platt. "Thickness of immediate dentin sealing materials and its effect on the fracture load of a reinforced all-ceramic crown." European Journal of Dentistry 07, no. 04 (2013): 474–83. http://dx.doi.org/10.4103/1305-7456.120682.
Full textMohammed B. Al-Doori. "Open-Source IDS/IPS Using Statistical and Deep Learning Based Anomaly Detection in SDN." Journal of Information Systems Engineering and Management 10, no. 2s (2025): 269–84. https://doi.org/10.52783/jisem.v10i2s.288.
Full textMahendra, Daniel Desma, and Fransiska Sisilia Mukti. "Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API." Techno.Com 21, no. 3 (2022): 511–22. http://dx.doi.org/10.33633/tc.v21i3.6466.
Full textSilalahi, Lukman Medriavin, and Andhika Kurniawan. "Analisis Keamanan Jaringan Menggunakan Intrusion Prevention System (Ips) Dengan Metode Traffic Behavior." Electrician : Jurnal Rekayasa dan Teknologi Elektro 17, no. 1 (2023): 71–76. http://dx.doi.org/10.23960/elc.v17n1.2296.
Full textAtmadji, Ery Setiyawan Jullev, Bekti Maryuni Susanto, and Rahardian Wiratama. "Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server." Teknika 6, no. 1 (2017): 19–23. http://dx.doi.org/10.34148/teknika.v6i1.55.
Full textBalla, Asaad, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md Rafiqul Islam, and F. M. Suliman. "The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems." Sensors 23, no. 2 (2023): 758. http://dx.doi.org/10.3390/s23020758.
Full textSaito, Satomi, Koji Maruhashi, Masahiko Takenaka, and Satoru Torii. "TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs." Journal of Information Processing 24, no. 2 (2016): 217–26. http://dx.doi.org/10.2197/ipsjjip.24.217.
Full textvan den Breemer, C., MMM Gresnigt, M. Özcan, W. Kerdijk, and MS Cune. "Prospective Randomized Clinical Trial on the Survival of Lithium Disilicate Posterior Partial Crowns Bonded Using Immediate or Delayed Dentin Sealing: Short-term Results on Tooth Sensitivity and Patient Satisfaction." Operative Dentistry 44, no. 5 (2019): E212—E222. http://dx.doi.org/10.2341/18-047-c.
Full textГодована, Мар’яна, та Леся Мичуда. "АТАКИ НА ТАБЛИЦІ МАС-АДРЕС, МЕТОДИ БОРОТЬБИ З ЦИМИ АТАКАМИ". Grail of Science, № 41 (26 липня 2024): 265–71. http://dx.doi.org/10.36074/grail-of-science.05.07.2024.041.
Full textWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Full textDa Silva, Alysson Dias, and Marcelo Ladvocat. "The Social Progress Index and the evolution of indexes: a theoretical reflection." Brazilian Journal of Business 4, no. 4 (2022): 2495–501. http://dx.doi.org/10.34140/bjbv4n4-058.
Full textKhadafi, Shah, Budanis Dwi Meilani, and Samsul Arifin. "SISTEM KEAMANAN OPEN CLOUD COMPUTING MENGGUNAKAN IDS (INTRUSION DETECTION SYSTEM) DAN IPS (INTRUSION PREVENTION SYSTEM)." Jurnal IPTEK 21, no. 2 (2017): 67. http://dx.doi.org/10.31284/j.iptek.2017.v21i2.207.
Full text