Dissertations / Theses on the topic 'Intrusion detection and analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Intrusion detection and analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Alessandri, Dominique. "Attack-class-based analysis of intrusion detection systems." Thesis, University of Newcastle Upon Tyne, 2004. http://hdl.handle.net/10443/2094.
Full textWebster, Seth E. (Seth Emerson) 1975. "The development and analysis of intrusion detection algorithms." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50439.
Full textHendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.
Full textSchiavo, Sandra Jean. "An intrusion-detection tutoring system using means-ends analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA294283.
Full textCetin, Burak. "Wireless Network Intrusion Detection and Analysis using Federated Learning." Youngstown State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1588778320687729.
Full textZomlot, Loai M. M. "Handling uncertainty in intrusion analysis." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/17603.
Full textSatam, Pratik. "An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/595654.
Full textBorek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Full textSakthivelmurugan, Sakthiyuvaraja. "An empirical approach to modeling uncertainty in intrusion analysis." Thesis, Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/2337.
Full textMitchel, Robert Raymondl III. "Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19338.
Full textSpicer, Matthew William. "Intrusion Detection System for Electronic Communication Buses: A New Approach." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/81863.
Full textZhang, Tao. "RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-08042006-122745/.
Full textAlbin, Eugene. "A comparative analysis of the Snort and Suricata intrusion-detection systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5480.
Full textFreet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.
Full textMathur, Nitin O. "Application of Autoencoder Ensembles in Anomaly and Intrusion Detection using Time-Based Analysis." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161374876195402.
Full textCarey, Nathan. "Correlation of Heterogenous IDS Alerts for Attack Detection." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15872/.
Full textAmso, Julian, and Achille Faienza. "IPsec Intrusion Detection Analysis : Using data from an Ericsson Ethernet Interface Board." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91865.
Full textWilliams, Lloyd. "Augmentation of Intrusion Detection Systems Through the Use of Bayesian Network Analysis." NCSU, 2006. http://www.lib.ncsu.edu/theses/available/etd-11292005-200153/.
Full textCorsini, Julien. "Analysis and evaluation of network intrusion detection methods to uncover data theft." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/output/4031/.
Full textThorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.
Full textKanaujia, Swati. "Rogue Access Point Detection through Statistical Analysis." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/42576.
Full textRaje, Archis Vijay. "Analysis of e-mail attachment signatures for potential use by intrusion detection systems." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3395.
Full textGil, Casals Silvia. "Risk assessment and intrusion detection for airbone networks." Thesis, Toulouse, INSA, 2014. http://www.theses.fr/2014ISAT0021/document.
Full textMelo, Daniel Araújo. "ARCA - Alerts root cause analysis framework." Universidade Federal de Pernambuco, 2014. https://repositorio.ufpe.br/handle/123456789/13946.
Full textVu, Hong Linh. "DNS Traffic Analysis for Network-based Malware Detection." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93842.
Full textJanagam, Anirudh, and Saddam Hossen. "Analysis of Network Intrusion Detection System with Machine Learning Algorithms (Deep Reinforcement Learning Algorithm)." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17126.
Full textMolazem, Tabrizi Farid. "Security analysis and intrusion detection for embedded systems : a case study of smart meters." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/63325.
Full textSiraj, Ambareen. "A unified alert fusion model for intelligent analysis of sensor data in an intrusion detection environment." Diss., Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.
Full textEllis, Brenda Lee. "The Human Analysis Element of Intrusion Detection: A Cognitive Task Model and Interface Design and Implications." NSUWorks, 2009. http://nsuworks.nova.edu/gscis_etd/145.
Full textQin, Xinzhou. "A Probabilistic-Based Framework for INFOSEC Alert Correlation." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7278.
Full textHueca, Angel L. "Development and Validation of a Proof-of-Concept Prototype for Analytics-based Malicious Cybersecurity Insider Threat in a Real-Time Identification System." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1063.
Full textSulaman, Sardar Muhammad. "An Analysis and Comparison of The Security Features of Firewalls and IDSs." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.
Full textAlipour, Hamid Reza. "An Anomaly Behavior Analysis Methodology for Network Centric Systems." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/305804.
Full textPetersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textAl-Hamadi, Hamid Helal. "Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/47681.
Full textBykova, Marina. "Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet." Ohio University / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1013543289.
Full textLee, Robert. "ON THE APPLICATION OF LOCALITY TO NETWORK INTRUSION DETECTION: WORKING-SET ANALYSIS OF REAL AND SYNTHETIC NETWORK SERVER TRAFFIC." Doctoral diss., Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002718.
Full textCho, Jin-Hee. "Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/29653.
Full textAditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Full textOree, William L. "Analysis of the United States Computer Emergency Readiness Team's (U.S. CERT) Einstein III intrusion detection system, and its impact on privacy." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32877.
Full textPan, Zhiwen, and Zhiwen Pan. "A Context Aware Anomaly Behavior Analysis Methodology for Building Automation Systems." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625624.
Full textAbdullah, Hanifa. "A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks." Diss., Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-10122006-155850.
Full textBao, Fenye. "Dynamic Trust Management for Mobile Networks and Its Applications." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23157.
Full textQaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Full textYu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Full textPayne, Bryan D. "Improving host-based computer security using secure active monitoring and memory analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34852.
Full textProto, André [UNESP]. "Detecção de eventos de segurança de redes por intermédio de técnicas estatísticas e associativas aplicadas a fluxos de dados." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98688.
Full textLeichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.
Full textKhasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.
Full textAwodokun, Olugbenga. "Classification of Patterns in Streaming Data Using Clustering Signatures." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504880155623189.
Full text