Dissertations / Theses on the topic 'Intrusion Detection Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Intrusion Detection Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Janagam, Anirudh, and Saddam Hossen. "Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm)." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17126.
Full textPillay, Manju Mohan. "Applying genetic algorithm techniques in network intrusion detection systems / Pillai, M.M." Thesis, North-West University, 2011. http://hdl.handle.net/10394/7030.
Full textPentukar, Sai Kiran. "OCLEP+: One-Class Intrusion Detection Using Length of Patterns." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1496147438710588.
Full textAl, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.
Full textThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textKim, Jung Won. "Integrating artificial immune algorithms for intrusion detection." Thesis, University College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398425.
Full textWebster, Seth E. (Seth Emerson) 1975. "The development and analysis of intrusion detection algorithms." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50439.
Full textKannan, Anand. "Performance evaluation of security mechanisms in Cloud Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99464.
Full textOzbey, Halil. "A Genetic-based Intelligent Intrusion Detection System." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606636/index.pdf.
Full textWan, Tao. "IntruDetector, a software platform for testing network intrusion detection algorithms." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ60258.pdf.
Full textBotes, Frans Hendrik. "Ant tree miner amyntas for intrusion detection." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2865.
Full textAbas, Ashardi B. "Non-intrusive driver drowsiness detection system." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5521.
Full textRastegari, Samaneh. "Intelligent network intrusion detection using an evolutionary computation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1760.
Full textKopek, Christopher Vincent. "Parallel intrusion detection systems for high speed networks using the divided data parallel method." Electronic thesis, 2007. http://dspace.zsr.wfu.edu/jspui/handle/10339/191.
Full textAl, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.
Full textPetersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textYu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Full textMoured, David Paul. "Dynamic Game-Theoretic Models to Determine the Value of Intrusion Detection Systems in the Face of Uncertainty." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/26.
Full textHyla, Bret M. "Sample Entropy and Random Forests a methodology for anomaly-based intrusion detection and classification of low-bandwidth malware attacks /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHyla.pdf.
Full textDella, Chiesa Enrico. "Implementazione Tensorflow di Algoritmi di Anomaly Detection per la Rilevazione di Intrusioni Mediante Signals of Opportunity (SoOP)." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textStanek, Timotej. "Automatické shlukování regulárních výrazů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235531.
Full textKhasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.
Full textAndersson, Robin. "Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.
Full textAlkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Full textChen, Chung-Hung, and 陳忠鴻. "New Pattern Search Algorithm for Intrusion Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/22117646859803730483.
Full textChen, Tze-Hung, and 陳則宏. "A Hybrid Classification Algorithm for Intrusion Detection System." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394050%22.&searchmode=basic.
Full textLin, Hou-Lung, and 林厚龍. "A Load Balancing Algorithm for Distributed Intrusion Detection Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/30771484338806241223.
Full textKuang, Liwei. "DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm." Thesis, 2007. http://hdl.handle.net/1974/671.
Full textTseng, Hung-Lin, and 曾鴻麟. "An Ensemble Based Classification Algorithm for Network Intrusion Detection System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/16771777095571370354.
Full textHsu, Kai-Shuo, and 許凱碩. "Investigation and Simulation of an OTDR-based Perimeter Intrusion Detection System and Its Intrusion Locating Algorithm." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/pvpj8g.
Full textGeta, Gemechu. "A HYBRID FUZZY/GENETIC ALGORITHM FOR INTRUSION DETECTION IN RFID SYSTEMS." 2011. http://hdl.handle.net/10222/14416.
Full textHsu, Ying-Che, and 徐英哲. "An Adaptive Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/xw7767.
Full textTseng, Jen-Chih, and 曾仁志. "A Static Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28811918020972188152.
Full textHung, Ching-You, and 洪精佑. "A Function-Parallelism Pattern-Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09791445668449235501.
Full textYang, Jing Yao, and 楊景堯. "Using GPU to Improve Matching Algorithm for Network Intrusion Detection Systems." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/54300985659005835704.
Full textYU, CHANG-CHING, and 游錦昌. "Design and Implementation of Highly Accurate Hierarchical Clustering Algorithm for Intrusion Detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/63918180499345437958.
Full textChen, Yu-Shu, and 陳毓書. "Combining Incremental Hidden Markov Model and Adaboost Algorithm for Anomaly Intrusion Detection." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/38799778297148881388.
Full textChiu, Chi-Chang, and 邱啟彰. "Design a Two-Way Fast String-Matching Algorithm for Intrusion Detection System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/86518049918252358632.
Full text陳建麟. "A Parallel String Matching Algorithm for High Speed Network Intrusion Detection System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/57773162720790226759.
Full textChen, Jhao Han, and 陳昭翰. "An Effective Pattern Matching Algorithm for Network Intrusion Detection Using Network Processors." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36725737784923767693.
Full textSubramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1384.
Full textSubramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1384.
Full textChien, Sheng-Wei, and 簡聖瑋. "Using Genetic Algorithm to Improve Network Intrusion Detection System Based on Incremental Mining." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72660456867463518111.
Full textSajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. https://etd.iisc.ac.in/handle/2005/1282.
Full textSajana, Abu R. "A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1282.
Full textStewart, IAN. "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection." Thesis, 2009. http://hdl.handle.net/1974/1720.
Full textKo, Wan-Pao, and 柯萬保. "Using Support Vector Machine and Genetic Algorithm to Reduce Asymmetric Cost in Intrusion Detection System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90052706830973803219.
Full textChang, Yu-Cheng, and 張育政. "A hybrid approach of rough set theory and genetic algorithm for SVM-based intrusion detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86699518854455525991.
Full textCheng-FengKe and 柯埕峰. "Accelerating Aho-Corasick Algorithm using Odd-Even Sub Pattern to improve Snort Intrusion Detection System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/487b46.
Full text(6636224), Seunghee Lee. "Incremental Support Vector Machine Approach for DoS and DDoS Attack Detection." Thesis, 2019.
Find full text