Academic literature on the topic 'Intrusion detection systems (Computer security)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion detection systems (Computer security).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intrusion detection systems (Computer security)"
Mane, Prof Dipali. "Machine Learning Algorithms for Intrusion Detection in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6315–21. http://dx.doi.org/10.22214/ijraset.2023.52788.
Full textPatidar, Sadhana, Priyanka Parihar, and Chetan Agrawal. "A Review of Intrusion Detection Datasets and Techniques." SMART MOVES JOURNAL IJOSCIENCE 6, no. 3 (2020): 14–22. http://dx.doi.org/10.24113/ijoscience.v6i3.277.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textBattini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.
Full textSun, Yu Tao. "Design and Research on Intrusion Detection System in the Computer Network Security." Applied Mechanics and Materials 416-417 (September 2013): 1418–22. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1418.
Full textAyachi, Yassine, Youssef Mellah, Mohammed Saber, Noureddine Rahmoun, Imane Kerrakchou, and Toumi Bouchentouf. "A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 4 (2022): 1607. http://dx.doi.org/10.11591/ijai.v11.i4.pp1607-1614.
Full textLafta, Hameed. "Network Intrusion Detection Using Optimal Perception with Cuckoo Algorithm." Wasit Journal for Pure sciences 3, no. 1 (2024): 95–105. http://dx.doi.org/10.31185/wjps.326.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textP, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.
Full textDissertations / Theses on the topic "Intrusion detection systems (Computer security)"
Lydon, Andrew. "Compilation For Intrusion Detection Systems." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088179093.
Full textAsarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.
Full textJacoby, Grant A. "Battery-based intrusion detection /." This resource online, 2005. http://scholar.lib.vt.edu/theses/available/etd-04212005-120840.
Full textYüksel, Ulaş Tuğlular Tuğkan. "Development of a Quality Assurance Prototype for Intrusion Detection Systems/." [s.l.]: [s.n.], 2002. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000131.pdf.
Full textFogla, Prahlad. "Improving the Efficiency and Robustness of Intrusion Detection Systems." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19772.
Full textBotes, Frans Hendrik. "Ant tree miner amyntas for intrusion detection." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2865.
Full textArvidson, Martin, and Markus Carlbark. "Intrusion Detection Systems : Technologies, Weaknesses and Trends." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1614.
Full textGupta, Kapil Kumar. "Robust and efficient intrusion detection systems." Connect to thesis, 2009. http://repository.unimelb.edu.au/10187/3588.
Full textUzuncaova, Engin. "A generic software architecture for deception-based intrusion detection and response systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FUzuncaova.pdf.
Full textKalibjian, Jeffrey R. "APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/606817.
Full textBooks on the topic "Intrusion detection systems (Computer security)"
Roberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Springer-Verlag US, 2008.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textSushil, Jajodia, and Wang Sean 1960-, eds. Intrusion detection in distributed systems: An abstraction-based approach. Kluwer Academic Publishers, 2004.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.
Find full textNational Institute of Standards and Technology (U.S.), ed. An overview of issues in testing intrusion detection systems. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.
Find full textBook chapters on the topic "Intrusion detection systems (Computer security)"
Cho, Sung-Bae, and Sang-Jun Han. "Intrusion Detection for Computer Security." In Computationally Intelligent Hybrid Systems. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9780471683407.ch8.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_13.
Full textGu, Guofei, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. "Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems." In Computer Security – ESORICS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11863908_32.
Full textLee, Sin Yeung, Wai Lup Low, and Pei Yuen Wong. "Learning Fingerprints for a Database Intrusion Detection System." In Computer Security — ESORICS 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45853-0_16.
Full textHamed, Tarfa, Jason B. Ernst, and Stefan C. Kremer. "A Survey and Taxonomy of Classifiers of Intrusion Detection Systems." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_2.
Full textGu, Jie. "An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_10.
Full textErnst, Jason, Tarfa Hamed, and Stefan Kremer. "A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_32.
Full textAmato, Flora, Giovanni Cozzolino, Antonino Mazzeo, and Emilio Vivenzio. "Using Multilayer Perceptron in Computer Security to Improve Intrusion Detection." In Intelligent Interactive Multimedia Systems and Services 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59480-4_22.
Full textConference papers on the topic "Intrusion detection systems (Computer security)"
Silva Neto, Manuel Gonçalves da, and Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Full textGrzech, Adam, and Mariusz Kazmierski. "Distributed Intrusion Detection Systems of Computer Communication Networks." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.39.
Full textBesharatloo, Mohammad, Atiye Rahimizadeh, and Masoud Besharatloo. "Hybrid Intrusion Detection Model for Computer Networks." In 11th International Conference on Signal Image Processing and Multimedia. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130906.
Full textMassicotte, Frederic, Francois Gagnon, Yvan Labiche, Lionel Briand, and Mathieu Couture. "Automatic Evaluation of Intrusion Detection Systems." In 2006 22nd Annual Computer Security Applications Conference (ACSAC'06). IEEE, 2006. http://dx.doi.org/10.1109/acsac.2006.15.
Full textElaeraj, Ouafae, and Cherkaoui Leghris. "The Evolution of Vector Machine Support in the Field of Intrusion Detection Systems." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111817.
Full textAwad, Mohamed TajElsir, Sally Mohamed Aldaw, Salma Mohamed Aldaw, and Babekir A. rahman Osman. "Video Security System for Intrusion Detection." In 2019 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE). IEEE, 2019. http://dx.doi.org/10.1109/iccceee46830.2019.9070823.
Full textWolsing, Konrad, Eric Wagner, and Martin Henze. "Facilitating Protocol-independent Industrial Intrusion Detection Systems." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3372297.3420019.
Full textJ, Latha, KarthickMurugan S, and Logalakshmi A. "Computer Networks Cyber Security Via an Intrusion Detection System." In 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE). IEEE, 2023. http://dx.doi.org/10.1109/rmkmate59243.2023.10369517.
Full textYampolskiy, Roman V. "Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems." In 2007 41st Annual IEEE International Carnahan Conference on Security Technology. IEEE, 2007. http://dx.doi.org/10.1109/ccst.2007.4373481.
Full textEl-Kosairy, Ahmed, and Marianne A. Azer. "Intrusion and ransomware detection system." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8471688.
Full textReports on the topic "Intrusion detection systems (Computer security)"
Ingram, Dennis J., H. S. Kremer, and Neil C. Rowe. Distributed Intrusion Detection for Computer Systems Using Communicating Agents. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada458055.
Full textTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full text