Academic literature on the topic 'Intrusion detection and analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion detection and analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intrusion detection and analysis"
Li, You Guo. "Analysis of the Snort Building Code Based on IDS." Applied Mechanics and Materials 543-547 (March 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Full textT, Krishnakaarthik. "Intrusion Detection and Vulnerability Analysis with Temporal Relationalship." International Journal of Psychosocial Rehabilitation 23, no. 4 (2019): 1205–16. http://dx.doi.org/10.37200/ijpr/v23i4/pr190447.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textGu, Yue Sheng, Hong Yu Feng, and Jian Ping Wang. "Analysis of Intrusion Detection System." Key Engineering Materials 460-461 (January 2011): 451–54. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.451.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textA. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textSong, Youngrok, Sangwon Hyun, and Yun-Gyung Cheong. "Analysis of Autoencoders for Network Intrusion Detection." Sensors 21, no. 13 (2021): 4294. http://dx.doi.org/10.3390/s21134294.
Full textSurasit Songma, Witcha Chimphlee, Kiattisak Maichalernnukul, and Parinya Sanguansat. "Intrusion Detection through Rule Induction Analysis." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 11 (2013): 187–94. http://dx.doi.org/10.4156/aiss.vol5.issue11.23.
Full textZHONG, SHI, TAGHI M. KHOSHGOFTAAR, and NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION." International Journal of Reliability, Quality and Safety Engineering 14, no. 02 (2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textDissertations / Theses on the topic "Intrusion detection and analysis"
Alessandri, Dominique. "Attack-class-based analysis of intrusion detection systems." Thesis, University of Newcastle Upon Tyne, 2004. http://hdl.handle.net/10443/2094.
Full textWebster, Seth E. (Seth Emerson) 1975. "The development and analysis of intrusion detection algorithms." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50439.
Full textHendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.
Full textSchiavo, Sandra Jean. "An intrusion-detection tutoring system using means-ends analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA294283.
Full textCetin, Burak. "Wireless Network Intrusion Detection and Analysis using Federated Learning." Youngstown State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1588778320687729.
Full textZomlot, Loai M. M. "Handling uncertainty in intrusion analysis." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/17603.
Full textSatam, Pratik. "An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/595654.
Full textBorek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Full textSakthivelmurugan, Sakthiyuvaraja. "An empirical approach to modeling uncertainty in intrusion analysis." Thesis, Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/2337.
Full textMitchel, Robert Raymondl III. "Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19338.
Full textBooks on the topic "Intrusion detection and analysis"
Trost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Addison-Wesley, 2009.
Find full textDavide, Balzarotti, Maier Gregor, and SpringerLink (Online service), eds. Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textSengupta, Nandita, and Jaya Sil. Intrusion Detection. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6.
Full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Springer-Verlag US, 2008.
Find full textSobirey, Michael. Datenschutzorientiertes Intrusion Detection. Vieweg+Teubner Verlag, 1999. http://dx.doi.org/10.1007/978-3-322-86850-3.
Full textBook chapters on the topic "Intrusion detection and analysis"
Debar, Hervé, and Jouni Viinikka. "Intrusion Detection: Introduction to Intrusion Detection and Security Information Management." In Foundations of Security Analysis and Design III. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554578_7.
Full textGunetti, Daniele, and Giancarlo Ruffo. "Intrusion Detection through Behavioral Data." In Advances in Intelligent Data Analysis. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48412-4_32.
Full textShin, Moon Sun, and Kyeong Ja Jeong. "Alert Correlation Analysis in Intrusion Detection." In Advanced Data Mining and Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11811305_114.
Full textRawat, Sanjay, and Challa S. Sastry. "Network Intrusion Detection Using Wavelet Analysis." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30561-3_24.
Full textLaskov, Pavel, Patrick Düssel, Christin Schäfer, and Konrad Rieck. "Learning Intrusion Detection: Supervised or Unsupervised?" In Image Analysis and Processing – ICIAP 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11553595_6.
Full textBostami, Biozid, and Mohiuddin Ahmed. "Intrusion Detection for Big Data." In Data Analytics. CRC Press, 2018. http://dx.doi.org/10.1201/9780429446177-15.
Full textSridevi, S., and R. Anandan. "Analysis of Classification-Based Intrusion-Detection Techniques." In Information Security and Optimization. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-9.
Full textZhi, Zhang. "IPv6 Network Intrusion Detection Protocol Analysis Techniques." In Advances in Intelligent Systems and Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-33030-8_15.
Full textMassicotte, Frédéric. "Packet Space Analysis of Intrusion Detection Signatures." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_26.
Full textRoy, Sanjiban Sekhar, Omsai Jadhav, Saptarshi Chakraborty, Swapnil Saurav, and Madhu Viswanatham. "Multicriteria Decision Analysis for Intrusion Detection Data." In Advances in Intelligent Systems and Computing. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_79.
Full textConference papers on the topic "Intrusion detection and analysis"
Hogo, Mofreh A. "Temporal analysis of intrusion detection." In 2014 International Carnahan Conference on Security Technology (ICCST). IEEE, 2014. http://dx.doi.org/10.1109/ccst.2014.6987012.
Full textYu-Xin Wei and Mu-Qing Wu. "KFDA-waveletcluster based intrusion detection technology." In 2007 International Conference on Wavelet Analysis and Pattern Recognition. IEEE, 2007. http://dx.doi.org/10.1109/icwapr.2007.4421766.
Full textTitorenko, Aleksey A., and Alexey A. Frolov. "Analysis of modern intrusion detection system." In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2018. http://dx.doi.org/10.1109/eiconrus.2018.8317049.
Full textAhmad, Iftikhar, Azween B. Abdullah, and Abdullah S. Alghamdi. "Comparative Analysis of Intrusion Detection Approaches." In 2010 12th International Conference on Computer Modelling and Simulation. IEEE, 2010. http://dx.doi.org/10.1109/uksim.2010.112.
Full textNagaraja, Arun, Uma Boregowda, and Radhakrishna Vangipuram. "Regression analysis for network intrusion detection." In DATA'21: International Conference on Data Science, E-learning and Information Systems 2021. ACM, 2021. http://dx.doi.org/10.1145/3460620.3460751.
Full textTERAI, ASUKA, TATSUYA CHIBA, HIDEYUKI SHINTANI, SHOYA KOJIMA, SHINGO ABE, and ICHIRO KOSHIJIMA. "INTRUSION DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEMS USING SINGULAR SPECTRUM ANALYSIS." In RISK ANALYSIS 2018. WIT Press, 2018. http://dx.doi.org/10.2495/risk180171.
Full textAhmad, Umair, Hira Asim, Malik Tahir Hassan, and Sheraz Naseer. "Analysis of Classification Techniques for Intrusion Detection." In 2019 International Conference on Innovative Computing (ICIC). IEEE, 2019. http://dx.doi.org/10.1109/icic48496.2019.8966675.
Full textBrandao, Andre, and Petia Georgieva. "Log Files Analysis For Network Intrusion Detection." In 2020 IEEE 10th International Conference on Intelligent Systems (IS). IEEE, 2020. http://dx.doi.org/10.1109/is48319.2020.9199976.
Full textSahu, Santosh Kumar, Sauravranjan Sarangi, and Sanjaya Kumar Jena. "A detail analysis on intrusion detection datasets." In 2014 IEEE International Advance Computing Conference (IACC). IEEE, 2014. http://dx.doi.org/10.1109/iadcc.2014.6779523.
Full text"Application of clustering analysis in Intrusion Detection." In The 3rd International Conference on Intelligent Energy and Power Systems. Clausius Scientific Press Inc., 2017. http://dx.doi.org/10.23977/ieps.2017.1021.
Full textReports on the topic "Intrusion detection and analysis"
Etoty, Renee E., and Robert F. Erbacher. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada601590.
Full textSkormin, Victor A. High Order Non-Stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (IDS). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada464796.
Full textTomko, Albert A., Christian J. Rieser, Louis H. Buell, David R. Zaret, and William M. Turner. Wireless Intrusion Detection. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada466332.
Full textBace, Rebecca, and Peter Mell. Intrusion detection systems. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-31.
Full textGiffin, Jonathan T., David Dagon, Somesh Jha, Wenke Lee, and Barton P. Miller. Environment-Sensitive Intrusion Detection. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada448428.
Full textCowles, Robert D. Intrusion Detection and Physics. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/10009.
Full textRodriguez, J. R., J. C. Matter, and B. Dry. Interior intrusion detection systems. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/5977693.
Full textWood, M., and M. Erlinger. Intrusion Detection Message Exchange Requirements. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4766.
Full textLundy, Philip A., George W. Pittman, and Heinz J. Pletsch. Intrusion Detection System Methodology Investigation. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada198210.
Full textChang, Raymond J., Richard E. Harang, and Garrett S. Payer. Extremely Lightweight Intrusion Detection (ELIDe). Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592893.
Full text