Journal articles on the topic 'Instrusion Prevention System (IPS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Instrusion Prevention System (IPS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adi Wijaya, Adi Wijaya, Toibah Umi Kalsum, and Riska. "Penerapan OPNsense Sebagai Sistem Keamanan Web Server Menggunakan Metode Host Instrusion Prevention System." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 13, no. 2 (2023): 91–100. http://dx.doi.org/10.33369/jamplifier.v13i2.31514.
Full textNugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.
Full textNugroho, Muhammad Arief, and Novian Anggis Suwastika. "Perancangan Intrusion Prevention System pada Jaringan Software Defined Networks." JUMANJI (Jurnal Masyarakat Informatika Unjani) 2, no. 1 (2018): 1. http://dx.doi.org/10.26874/jumanji.v2i1.17.
Full textSurbakti, Kevin Jorenta, Rohmat Tulloh, and Muhammad Nazel Djibran. "Implementasi Anti-DDOS Menggunakan Intrusion Prevention System (IPS) terhadap Serangan DDOS." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 330–40. http://dx.doi.org/10.32493/informatika.v8i2.33685.
Full textTanang Anugrah, Faula, Syariful Ikhwan, and Jafaruddin Gusti A.G. "Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection." Techné : Jurnal Ilmiah Elektroteknika 21, no. 2 (2022): 199–210. http://dx.doi.org/10.31358/techne.v21i2.320.
Full textDulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Full textGuo, Jian, Hua Guo, and Zhong Zhang. "Research on High Performance Intrusion Prevention System Based on Suricata." Highlights in Science, Engineering and Technology 7 (August 3, 2022): 238–45. http://dx.doi.org/10.54097/hset.v7i.1077.
Full textNadir Ali, Mohammed, Madihah Mohd Saudi, Touhid Bhuiyan, and Azreena Abu Bakar. "Comparative Study of Traditional and Next Generation IPS." International Journal of Engineering & Technology 7, no. 4.15 (2018): 55. http://dx.doi.org/10.14419/ijet.v7i4.15.21371.
Full textArdiyanto, Yudhi. "Portabel Intrusion Prevention System Untuk Mengamankan Koneksi Internet Saat Menggunakan WiFi Publik." Jurnal Sisfokom (Sistem Informasi dan Komputer) 11, no. 1 (2022): 107–13. http://dx.doi.org/10.32736/sisfokom.v11i1.1223.
Full textTambunan, Bosman, Willy Sudiarto Raharjo, and Joko Purwadi. "Desain dan Implementasi Honeypot dengan Fwsnort dan PSAD sebagai Intrusion Prevention System." Jurnal ULTIMA Computing 5, no. 1 (2013): 1–7. http://dx.doi.org/10.31937/sk.v5i1.283.
Full textSafana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.
Full textSafana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.
Full textParenreng, Jumadi Mabe, Fahru Rizal, and Maya Sari Wahyuni. "Simulation and Analysis of Network Security using Port Knocking and Intrusion Prevention System on Linux Server." Internet of Things and Artificial Intelligence Journal 4, no. 2 (2024): 226–43. http://dx.doi.org/10.31763/iota.v4i2.726.
Full textTaufik, Rahman Ilham Rozen. "Strategi Penguatan Keamanan Jaringan dengan IDS dan IPS di PT. Toppan Plasindo Lestari Cibitung." TEKNIKA 19, no. 1 (2024): 249–59. https://doi.org/10.5281/zenodo.14195077.
Full textArta, Yudhi, Abdul Syukur, and Roni Kharisma. "Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik." IT JOURNAL RESEARCH AND DEVELOPMENT 3, no. 1 (2018): 104–14. http://dx.doi.org/10.25299/itjrd.2018.vol3(1).1346.
Full textSusanti, Risa Eri, Arif Wirawan Muhammad, and Wahyu Adi Prabowo. "Implementasi Intrusion Prevention System (IPS) OSSEC dan Honeypot Cowrie." Jurnal Sisfokom (Sistem Informasi dan Komputer) 11, no. 1 (2022): 73–78. http://dx.doi.org/10.32736/sisfokom.v11i1.1246.
Full textBharti, Shubham. "Intrusion detection and prevention systems (IDS/IPS) for OS protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31718.
Full textSuryayusra, Suryayusra, and Dedi Irawan. "PERBANDINGAN INTRUSION PREVENTION SYSTEM (IPS) PADA LINUX UBUNTU DAN LINUX CENTOS." Jurnal Teknologi Informasi Mura 12, no. 02 (2020): 131–44. http://dx.doi.org/10.32767/jti.v12i02.1023.
Full textAng, Sokroeurn, Sopheaktra Huy, and Midhunchakkaravarthy Janarthanan. "Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 77–88. https://doi.org/10.63180/jcsra.thestap.2025.3.10.
Full textSilalahi, Lukman Medriavin, and Andhika Kurniawan. "Analisis Keamanan Jaringan Menggunakan Intrusion Prevention System (Ips) Dengan Metode Traffic Behavior." Electrician : Jurnal Rekayasa dan Teknologi Elektro 17, no. 1 (2023): 71–76. http://dx.doi.org/10.23960/elc.v17n1.2296.
Full textZulmy Alhamri, Rinanza, Kunti Eliyen, and Agustono Heriadi. "PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS." Jurnal Mnemonic 6, no. 2 (2023): 135–48. http://dx.doi.org/10.36040/mnemonic.v6i2.6727.
Full textKorcak, Michal, Jaroslav Lamer, and Frantisek Jakab. "Intrusion Prevention/Intrusion Detection System (IPS/IDS) for Wifi Networks." International journal of Computer Networks & Communications 6, no. 4 (2014): 77–89. http://dx.doi.org/10.5121/ijcnc.2014.6407.
Full textWahyudi, Farid, and Listanto Tri Utomo. "Perancangan Security Network Intrusion Prevention System Pada PDTI Universitas Islam Raden Rahmat Malang." Edumatic: Jurnal Pendidikan Informatika 5, no. 1 (2021): 60–69. http://dx.doi.org/10.29408/edumatic.v5i1.3278.
Full textCrichigno, Jorge, Mahsa Pourvali, Farooq Shaikh, Ammar Rayes, Elias Bou-Harb, and Nasir Ghani. "Optimal Traffic Scheduling for Intrusion Prevention Systems." International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 6, no. 2 (2017): 73. http://dx.doi.org/10.11601/ijates.v6i2.201.
Full textGandhar, Abhishek, Prakhar Priyadarshi, Shashi Gandhar, S. B. Kumar, Arvind Rehalia, and Mohit Tiwari. "An Effective Deep Learning Model Design for Cyber Intrusion Prevention System." Indian Journal Of Science And Technology 18, no. 10 (2025): 811–15. https://doi.org/10.17485/ijst/v18i10.318.
Full textMuhaimi, Abdul, I. Putu Hariyadi, and Akbar Juliansyah. "Analisa Penerapan Intrusion Prevention System (IPS) Berbasis Snort Sebagai Pengaman Server Internet Yang Terintegrasi Dengan Telegram." Jurnal Bumigora Information Technology (BITe) 1, no. 2 (2019): 167–76. http://dx.doi.org/10.30812/bite.v1i2.611.
Full textAbhishek, Gandhar, Priyadarshi Prakhar, Gandhar Shashi, B. Kumar S, Rehalia Arvind, and Tiwari Mohit. "An Effective Deep Learning Model Design for Cyber Intrusion Prevention System." Indian Journal of Science and Technology 18, no. 10 (2025): 811–15. https://doi.org/10.17485/IJST/v18i10.318.
Full textFarhaoui, Yousef. "How to secure web servers by the intrusion prevention system (IPS)?" International Journal of Advanced Computer Research 6, no. 23 (2016): 65–71. http://dx.doi.org/10.19101/ijacr.2016.623028.
Full textGupta, Manish, B. Chandra, and M. P. Gupta. "A framework of intelligent decision support system for Indian police." Journal of Enterprise Information Management 27, no. 5 (2014): 512–40. http://dx.doi.org/10.1108/jeim-10-2012-0073.
Full textAminanto, Alja, and Wiwin Sulistyo. "Simulasi Sistem Keamanan Jaringan Komputer Berbasis IPS Snort dan Honeypot Artilery." AITI 16, no. 2 (2020): 135–50. http://dx.doi.org/10.24246/aiti.v16i2.135-150.
Full textLee, Alan Y. P., Michael I. C. Wang, Chi-Hsiang Hung, and Charles H. P. Wen. "PS-IPS: Deploying Intrusion Prevention System with machine learning on programmable switch." Future Generation Computer Systems 152 (March 2024): 333–42. http://dx.doi.org/10.1016/j.future.2023.11.011.
Full textBarends, Julian Kevin, Favian Dewanta, and Nyoman Bogi Aditya Karna. "Perancangan dan Analisis Intrusion Prevention System Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network." MULTINETICS 7, no. 2 (2022): 163–76. http://dx.doi.org/10.32722/multinetics.v7i2.4276.
Full textKhadafi, Shah, Budanis Dwi Meilani, and Samsul Arifin. "SISTEM KEAMANAN OPEN CLOUD COMPUTING MENGGUNAKAN IDS (INTRUSION DETECTION SYSTEM) DAN IPS (INTRUSION PREVENTION SYSTEM)." Jurnal IPTEK 21, no. 2 (2017): 67. http://dx.doi.org/10.31284/j.iptek.2017.v21i2.207.
Full textKurniawan, Rifky, and Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan." SENTINEL 3, no. 1 (2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.
Full textAtmadji, Ery Setiyawan Jullev, Bekti Maryuni Susanto, and Rahardian Wiratama. "Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server." Teknika 6, no. 1 (2017): 19–23. http://dx.doi.org/10.34148/teknika.v6i1.55.
Full textInda, Sari, Yamin Muh, and Fid Aksara LM. "SISTEM MONITORING SERANGAN JARINGAN KOMPUTER BERBASIS WEB SERVICE MENGGUNAKAN HONEYPOT SEBAGAI INTRUSION PREVENTION SYSTEM." semanTIK 5, no. 1 (2019): 35–44. https://doi.org/10.5281/zenodo.2651714.
Full textTati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.
Full textSamsumar, Lalu Delsi, Bahtiar Imran, Muhamad Masjun Efendi, Rudi Muslim, Zumratul Muahidin, and Zaenul Mutaqin. "Optimalisasi Keamanan Web Server Ubuntu dengan Teknologi IPS Berbasis Iptables." JTERA (Jurnal Teknologi Rekayasa) 9, no. 2 (2024): 69. https://doi.org/10.31544/jtera.v9.i2.2024.69-76.
Full textWilliam, Rayco, Ikhwan Ruslianto, and Uray Ristian. "Implementation of Intrusion Prevention System (IPS) as a Website-Based Server Security System and Mobile Application." CESS (Journal of Computer Engineering, System and Science) 8, no. 1 (2023): 123. http://dx.doi.org/10.24114/cess.v8i1.40258.
Full textLYUBENOVA, Simona, Milen PETROV та Adelina ALEKSIEVA - PETROVA. "А Graph Database Intrusion Detection and Prevention System". Eurasia Proceedings of Science Technology Engineering and Mathematics 29 (15 грудня 2024): 182–91. https://doi.org/10.55549/epstem.1566169.
Full textDing, Shijie, Zhiwei Zhang, and Jun Xie. "Network security defense model based on firewall and IPS." Journal of Intelligent & Fuzzy Systems 39, no. 6 (2020): 8961–69. http://dx.doi.org/10.3233/jifs-189294.
Full textGómez Castaño, Julio César, Néstor Jaime Castaño Pérez, and Luis Carlos Correa Ortiz. "Sistemas de detección y prevención de intrusos." Ciencia e Ingeniería Neogranadina 33, no. 1 (2023): 75–86. http://dx.doi.org/10.18359/rcin.6534.
Full textLee, Hsiu-An, Hsin-Hua Kung, Yuarn-Jang Lee, et al. "Global Infectious Disease Surveillance and Case Tracking System for COVID-19: Development Study." JMIR Medical Informatics 8, no. 12 (2020): e20567. http://dx.doi.org/10.2196/20567.
Full textIriyanto, Muhammad. "Perbandingan Berbeda Alat Keamanan Untuk Mendeteksi Risiko Dalam Jaringan." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 107–13. http://dx.doi.org/10.61306/jnastek.v2i3.47.
Full textRakhimov, Bakhtiyorjon Nematovich, and Alevtina Aleksandrovna Muradova. "HARDWARE AND SOFTWARE PROTECTION MEANS OF PROTECTION OF CYBER ATTACKS OF INTERNET OF THINGS DEVICES." RESEARCH AND EDUCATION 3, no. 4 (2024): 11–17. https://doi.org/10.5281/zenodo.11109048.
Full textGusrion, Deval, Silky Safira, Retno Devita, Ruri Hartika Zain, and Rini Sovia. "DESIGN OF PRIVATE CLOUD STORAGE USING SECURITY METHODS IDS AND IPS." Jurnal Ipteks Terapan 15, no. 4 (2021): 461–65. http://dx.doi.org/10.22216/jit.v15i4.725.
Full textAwal, Hasri. "Implementasi Intrusion Detection Prevention System Sebagai Sistem Keamanan Jaringan Komputer Kejaksaan Negeri Pariaman Menggunkan Snort Dan Iptables Berbasis Linux." Jurnal Sains Informatika Terapan 2, no. 1 (2023): 38–44. http://dx.doi.org/10.62357/jsit.v2i1.184.
Full textGuo, Guangfeng, Junxing Zhang, and Zhanfei Ma. "Intrusion prevention with attack traceback and software-defined control plane for campus networks." Computer Science and Information Systems, no. 00 (2020): 49. http://dx.doi.org/10.2298/csis200206049g.
Full textDawamsyach, Fazar, Ikhwan Ruslianto, and Uray Ristian. "Implementation of IPS (Intrusion Prevention System) Fail2ban on Server for DDoS and Brute Force Attacks." CESS (Journal of Computer Engineering, System and Science) 8, no. 1 (2023): 149. http://dx.doi.org/10.24114/cess.v8i1.40259.
Full textWidiyanto, Wahyu Wijaya. "SIMRS Network Security Simulation Using Snort IDS and IPS Methods." Indonesian of Health Information Management Journal (INOHIM) 10, no. 1 (2022): 10–17. http://dx.doi.org/10.47007/inohim.v10i1.396.
Full text