Academic literature on the topic 'Intrusion Prevention System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion Prevention System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intrusion Prevention System"
Kaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textNinawe, Shreyash, Vilas Bariyekar, and Ranjita Asati. "Network Intrusion Prevention System." IJARCCE 8, no. 2 (2019): 196–99. http://dx.doi.org/10.17148/ijarcce.2019.8235.
Full textFarhaoui, Yousef. "Intrusion Prevention System Inspired Immune Systems." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 1 (2016): 168. http://dx.doi.org/10.11591/ijeecs.v2.i1.pp168-179.
Full textStiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "Characterizing Network Intrusion Prevention System." International Journal of Computer Applications 14, no. 1 (2011): 11–18. http://dx.doi.org/10.5120/1811-2439.
Full textSingh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Full textSafana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.
Full textSafana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textSu, Thawda Win. "Survival of an Intrusion Tolerance Database System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1748–51. https://doi.org/10.5281/zenodo.3591410.
Full textTasneem, Aaliya, Abhishek Kumar, and Shabnam Sharma. "Intrusion Detection Prevention System using SNORT." International Journal of Computer Applications 181, no. 32 (2018): 21–24. http://dx.doi.org/10.5120/ijca2018918280.
Full textDissertations / Theses on the topic "Intrusion Prevention System"
Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.
Full textDubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.
Full textStrnad, Matěj. "Návrh zabezpečení průmyslového řídícího systému." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399322.
Full textPagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textPagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textIvvala, Avinash Kiran. "Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14056.
Full textHanna, Johan. "Åtgärder för att motverka säkerhetsbrister i katalogtjänster." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39469.
Full textStefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.
Full textCheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.
Full textLabbe, Keith G. "Evaluation of two host-based intrusion prevention systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FLabbe.pdf.
Full textBooks on the topic "Intrusion Prevention System"
Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textPeter, Mell, and National Institute of Standards and Technology (U.S.), eds. Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Find full textSaxena, Manish. Next Generation Intelligent Network Intrusion Prevention System. Lulu Press, Inc., 2017.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textLammle, Todd, John Gay, and Alexis B. Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textRajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.
Find full textRajib, Nazmul. CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide. Pearson Education, Limited, 2022.
Find full textLammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textLammle, Todd, John Gay, and Alex Tatistcheff. SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285. Wiley & Sons, Incorporated, John, 2015.
Find full textBook chapters on the topic "Intrusion Prevention System"
Wang, Zongjian, and Xiaobo Li. "Intrusion Prevention System Design." In Lecture Notes in Electrical Engineering. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4847-0_47.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_13.
Full textJin, Hai, Zhiling Yang, Jianhua Sun, Xuping Tu, and Zongfen Han. "CIPS: Coordinated Intrusion Prevention System." In Information Networking. Convergence in Broadband and Mobile Networking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_10.
Full textErete, Ikpeme. "Browser-Based Intrusion Prevention System." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_29.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Texts in Computer Science. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_13.
Full textThoma, Jan Philipp, Florian Stolz, and Tim Güneysu. "Cips: The Cache Intrusion Prevention System." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-70903-6_1.
Full textAshoor, Asmaa Shaker, and Sharad Gore. "Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." In Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_48.
Full textConference papers on the topic "Intrusion Prevention System"
Shitole, Ruturaj Ramchandra, Sai Kumar Nekkanti, and Timothy Wood. "Poster: eBPF-Based Intrusion Prevention System for Database Servers." In 2024 IEEE Cloud Summit. IEEE, 2024. http://dx.doi.org/10.1109/cloud-summit61220.2024.00031.
Full textP, Sarumathy, Rajasree S, and Chandrasekar A. "An AI-Based Intrusion Prevention System to Enhance Cloud Security." In 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL). IEEE, 2025. https://doi.org/10.1109/icsadl65848.2025.10933485.
Full textRamachandran, Raji, Divya Gopan, and M. S. Harsha. "Intrusion Prevention System In RDBMS." In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993333.
Full textVasudeo, Sarode Harshal, Pravin Patil, and R. Vinoth Kumar. "IMMIX-intrusion detection and prevention system." In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE, 2015. http://dx.doi.org/10.1109/icstm.2015.7225396.
Full textMukhopadhyay, Indraneel, Kirit Sankar Gupta, Diptarshi Sen, and Piyali Gupta. "Heuristic Intrusion Detection and Prevention System." In 2015 International Conference and Workshop on Computing and Communication (IEMCON). IEEE, 2015. http://dx.doi.org/10.1109/iemcon.2015.7344479.
Full textAbdulrezzak, Sarah, and Firas A. Sabir. "Enhancing Intrusion Prevention in Snort System." In 2023 15th International Conference on Developments in eSystems Engineering (DeSE). IEEE, 2023. http://dx.doi.org/10.1109/dese58274.2023.10099757.
Full textPrasad, Romesh, and Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.
Full textLomotey, Richard K., and Ralph Deters. "Intrusion Prevention in Asterisk-Based Telephony System." In 2014 IEEE International Conference on Mobile Services (MS) . IEEE, 2014. http://dx.doi.org/10.1109/mobserv.2014.25.
Full textStiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "The trends of Intrusion Prevention System network." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529697.
Full textLih-Chyau Wuu, Yen-Hung Chen, Chih-Chieh Ma, and I-Tao Lung. "A practice of the intrusion prevention system." In TENCON 2007 - 2007 IEEE Region 10 Conference. IEEE, 2007. http://dx.doi.org/10.1109/tencon.2007.4428862.
Full textReports on the topic "Intrusion Prevention System"
Frish. PR-319-084511-R01 Advanced Development of Proactive Infrasonic Gas Pipeline Evaluation Network (PIGPEN). Pipeline Research Council International, Inc. (PRCI), 2014. http://dx.doi.org/10.55274/r0010816.
Full textScarfone, K. A., and P. M. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-94.
Full text