Journal articles on the topic 'Intrusion detection and analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intrusion detection and analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, You Guo. "Analysis of the Snort Building Code Based on IDS." Applied Mechanics and Materials 543-547 (March 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Full textT, Krishnakaarthik. "Intrusion Detection and Vulnerability Analysis with Temporal Relationalship." International Journal of Psychosocial Rehabilitation 23, no. 4 (2019): 1205–16. http://dx.doi.org/10.37200/ijpr/v23i4/pr190447.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textGu, Yue Sheng, Hong Yu Feng, and Jian Ping Wang. "Analysis of Intrusion Detection System." Key Engineering Materials 460-461 (January 2011): 451–54. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.451.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textA. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textSong, Youngrok, Sangwon Hyun, and Yun-Gyung Cheong. "Analysis of Autoencoders for Network Intrusion Detection." Sensors 21, no. 13 (2021): 4294. http://dx.doi.org/10.3390/s21134294.
Full textSurasit Songma, Witcha Chimphlee, Kiattisak Maichalernnukul, and Parinya Sanguansat. "Intrusion Detection through Rule Induction Analysis." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 11 (2013): 187–94. http://dx.doi.org/10.4156/aiss.vol5.issue11.23.
Full textZHONG, SHI, TAGHI M. KHOSHGOFTAAR, and NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION." International Journal of Reliability, Quality and Safety Engineering 14, no. 02 (2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textKorani, Ravinder, and Dr P. Chandra Sekhar Reddy. "Anomaly based Intrusion Detection by Heuristics to Predict Intrusion Scope of IOT Network Transactions." International Journal of Engineering & Technology 7, no. 2.7 (2018): 797. http://dx.doi.org/10.14419/ijet.v7i2.7.10982.
Full textHuang, Luo Guang, Li Min Meng, and Yong Hong Guo. "The Application of Network Intrusion Detection Technology in Instrument." Applied Mechanics and Materials 325-326 (June 2013): 1683–87. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1683.
Full textAssad, Noureddine, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou, and Driss Aboutajdine. "Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks." Journal of Computer Networks and Communications 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/812613.
Full textFang, Shi Lin, Yue Bin Wang, Quan Feng Yan, Yi Li, and Wen Bin Li. "The Analysis and Research of Intrusion Detection System Based on IPv6 Protocol Analysis." Advanced Materials Research 760-762 (September 2013): 617–22. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.617.
Full textCui, Wen Qiang. "Simulation and Analysis of the Network Feed-Forward Intrusion Detection Model." Applied Mechanics and Materials 556-562 (May 2014): 2932–35. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2932.
Full textZhao, Dong Ming. "Research on the Performance Analysis of Network Intrusion Detection of AC Algorithm." Advanced Materials Research 886 (January 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amr.886.646.
Full textAtnafu, Surafel Mehari, and Prof (Dr ). Anuja Kumar Acharya. "Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (2021): 22–28. http://dx.doi.org/10.35940/ijainn.b1025.041221.
Full textBakeyalakshmi, P., and S. K. Mahendran. "Enhanced replica detection scheme for efficient analysis of intrusion detection in MANET." International Journal of Engineering & Technology 7, no. 1.1 (2017): 565. http://dx.doi.org/10.14419/ijet.v7i1.1.10169.
Full textWange, Sonal, Shiv K. Sahu, and Amit Mishra. "A critical analysis on intrusion detection techniques." International Journal of Advanced Technology and Engineering Exploration 3, no. 19 (2016): 77–81. http://dx.doi.org/10.19101/ijatee.2016.319001.
Full textTsuge, Yusuke. "Intrusion Detection System with Spectrum Quantification Analysis." International Journal of Cyber-Security and Digital Forensics 5, no. 4 (2016): 197–207. http://dx.doi.org/10.17781/p002219.
Full textHanmante, Sumedh P., Uma Deshattiwar, and Renuka Pawar. "Multivariate correlation analysis for network intrusion detection." International Journal of Scientific & Engineering Research 7, no. 4 (2016): 1150–53. http://dx.doi.org/10.14299/ijser.2016.04.008.
Full textLunt, Teresa. "Automated audit trail analysis for intrusion detection." Computers & Security 11, no. 5 (1992): 492. http://dx.doi.org/10.1016/0167-4048(92)90256-q.
Full textLunt, Teresa. "Automated audit trail analysis for intrusion detection." Computer Audit Update 1992, no. 4 (1992): 2–8. http://dx.doi.org/10.1016/0960-2593(92)90034-k.
Full textXing, Bowen, Yafeng Jiang, Yuqing Liu, and Shouqi Cao. "Risk Data Analysis Based Anomaly Detection of Ship Information System." Energies 11, no. 12 (2018): 3403. http://dx.doi.org/10.3390/en11123403.
Full textWang, Zong Jiang, and Xiao Bo Li. "An Improved Intrusion Detection Model Design." Advanced Materials Research 710 (June 2013): 682–86. http://dx.doi.org/10.4028/www.scientific.net/amr.710.682.
Full textYaokumah, Winfred, and Isaac Wiafe. "Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection." International Journal of Distributed Artificial Intelligence 12, no. 1 (2020): 20–38. http://dx.doi.org/10.4018/ijdai.2020010102.
Full textN., Zafer Ahmed. "Analysis and Determination of Recent Developments on Intrusion Detection Schemes in Cloud Environment." Journal of Advanced Research in Dynamical and Control Systems 24, no. 4 (2020): 174–78. http://dx.doi.org/10.5373/jardcs/v12i4/20201430.
Full textAthavale, Nachiket, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, and S. S. Barde. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols." International Journal of Synthetic Emotions 8, no. 2 (2017): 62–75. http://dx.doi.org/10.4018/ijse.2017070105.
Full textRamaki, Ali Ahmadian, Abbas Rasoolzadegan, and Abbas Ghaemi Bafghi. "A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems." ACM Computing Surveys 51, no. 3 (2018): 1–41. http://dx.doi.org/10.1145/3184898.
Full textHajamydeen, Asif Iqbal, and Nur Izura Udzir. "A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework." Scalable Computing: Practice and Experience 20, no. 1 (2019): 113–60. http://dx.doi.org/10.12694/scpe.v20i1.1465.
Full textLi, Ke Wei. "The Simulation and Analysis of the Large-Scale Intrusion Detection Model in Shuffle Networks." Applied Mechanics and Materials 556-562 (May 2014): 2878–81. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2878.
Full textZhao, Yi Lin, and Qing Lei Zhou. "Intrusion Detection Method Based on LEGClust Algorithm." Applied Mechanics and Materials 263-266 (December 2012): 3025–33. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3025.
Full textZhang GuoYin, and Li Heng. "Research on Cluster Analysis for Intrusion Detection System." International Journal of Digital Content Technology and its Applications 6, no. 8 (2012): 98–106. http://dx.doi.org/10.4156/jdcta.vol6.issue8.12.
Full textAbdullah, Azween Bin, and Long Zheng Cai. "Improving Intrusion Detection using Genetic Linear Discriminant Analysis." International Journal of Intelligent Systems and Applications in Engineering 3, no. 1 (2015): 34. http://dx.doi.org/10.18201/ijisae.37262.
Full textGunale, Miss Sayali, Miss Renuka Tanksale, and Prof Mr U. K. Raut. "Intrusion Detection using Machine Learning and log analysis." IJARCCE 8, no. 4 (2019): 306–9. http://dx.doi.org/10.17148/ijarcce.2019.8450.
Full textAkbar, Shaik, Dr K. Nageswara Rao, and Dr J. A. Chandulal. "Intrusion Detection System Methodologies Based on Data Analysis." International Journal of Computer Applications 5, no. 2 (2010): 10–20. http://dx.doi.org/10.5120/892-1266.
Full textS, Ponmaniraj. "Web Intrusion Detection System through Crawler’s Event Analysis." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (2020): 2503–7. http://dx.doi.org/10.30534/ijatcse/2020/03932020.
Full textNisha, T. N., and Dhanya Pramod. "Sequential pattern analysis for event-based intrusion detection." International Journal of Information and Computer Security 11, no. 4/5 (2019): 476. http://dx.doi.org/10.1504/ijics.2019.10023475.
Full textLee, Yo-Seob. "Design and Analysis of Multiple Intrusion Detection Model." Journal of the Korea institute of electronic communication sciences 11, no. 6 (2016): 619–26. http://dx.doi.org/10.13067/jkiecs.2016.11.6.619.
Full textNisha, T. N., and Dhanya Pramod. "Sequential pattern analysis for event-based intrusion detection." International Journal of Information and Computer Security 11, no. 4/5 (2019): 476. http://dx.doi.org/10.1504/ijics.2019.101936.
Full textS., Apurva, and Deepak R. "Post-Attack Intrusion Detection using Log Files Analysis." International Journal of Computer Applications 127, no. 18 (2015): 19–21. http://dx.doi.org/10.5120/ijca2015906731.
Full textDhall, A., J. K. Chhabra, and N. S. Aulakh. "INTRUSION DETECTION SYSTEM BASED ON SPECKLE PATTERN ANALYSIS." Experimental Techniques 29, no. 1 (2005): 25–31. http://dx.doi.org/10.1111/j.1747-1567.2005.tb00200.x.
Full textPin Ren, Yan Gao, Zhichun Li, Yan Chen, and B. Watson. "IDGraphs: intrusion detection and analysis using stream compositing." IEEE Computer Graphics and Applications 26, no. 2 (2006): 28–39. http://dx.doi.org/10.1109/mcg.2006.36.
Full textDong, Yuhong, Sam Hsu, Saeed Rajput, and Bing Wu. "Experimental analysis of application-level intrusion detection algorithms." International Journal of Security and Networks 5, no. 2/3 (2010): 198. http://dx.doi.org/10.1504/ijsn.2010.032218.
Full textPonnusamy, Vasaki, Aun Yichiet, NZ Jhanjhi, Mamoona humayun, and Maram Fahhad Almufareh. "IoT Wireless Intrusion Detection and Network Traffic Analysis." Computer Systems Science and Engineering 40, no. 3 (2022): 865–79. http://dx.doi.org/10.32604/csse.2022.018801.
Full textVenkatachalam, K., P. Prabu, B. Saravana Balaji, Byeong-Gwon Kang, Yunyoung Nam, and Mohamed Abouhawwash. "Cross-Layer Hidden Markov Analysis for Intrusion Detection." Computers, Materials & Continua 70, no. 2 (2022): 3685–700. http://dx.doi.org/10.32604/cmc.2022.019502.
Full textJiao, Ya Bing. "Analysis and Research of Intrusion Detection System Based on Association Rule." Advanced Materials Research 709 (June 2013): 628–31. http://dx.doi.org/10.4028/www.scientific.net/amr.709.628.
Full textLaqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.
Full textLi, Zhi Gang, Ling Yun Chen, Ming Ji Wang, and Yu Shuang Li. "Simulation Study on Multi-Frequency Signal Detection in Perimeter Intrusion Detection System by Matlab." Applied Mechanics and Materials 530-531 (February 2014): 293–96. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.293.
Full textRadivilova, Tamara, Lyudmyla Kirichenko, Maksym Tawalbeh, Petro Zinchenko, and Vitalii Bulakh. "THE LOAD BALANCING OF SELF-SIMILAR TRAFFIC IN NETWORK INTRUSION DETECTION SYSTEMS." Cybersecurity: Education, Science, Technique 3, no. 7 (2020): 17–30. http://dx.doi.org/10.28925/2663-4023.2020.7.1730.
Full text