Journal articles on the topic 'Intrusion Prevention System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intrusion Prevention System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textNinawe, Shreyash, Vilas Bariyekar, and Ranjita Asati. "Network Intrusion Prevention System." IJARCCE 8, no. 2 (2019): 196–99. http://dx.doi.org/10.17148/ijarcce.2019.8235.
Full textFarhaoui, Yousef. "Intrusion Prevention System Inspired Immune Systems." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 1 (2016): 168. http://dx.doi.org/10.11591/ijeecs.v2.i1.pp168-179.
Full textStiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "Characterizing Network Intrusion Prevention System." International Journal of Computer Applications 14, no. 1 (2011): 11–18. http://dx.doi.org/10.5120/1811-2439.
Full textSingh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Full textSafana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.
Full textSafana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textSu, Thawda Win. "Survival of an Intrusion Tolerance Database System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1748–51. https://doi.org/10.5281/zenodo.3591410.
Full textTasneem, Aaliya, Abhishek Kumar, and Shabnam Sharma. "Intrusion Detection Prevention System using SNORT." International Journal of Computer Applications 181, no. 32 (2018): 21–24. http://dx.doi.org/10.5120/ijca2018918280.
Full textChauhan, Shivam Kumar, Abhishek Sharma, and Avinash Kaur. "Animal Intrusion Detection and Prevention System." International Journal of Computer and Organization Trends 11, no. 2 (2021): 25–28. http://dx.doi.org/10.14445/22492593/ijcot-v11i2p308.
Full textBhatnagar, Prerna. "Smart Security and Intrusion Prevention System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (2019): 908–10. http://dx.doi.org/10.22214/ijraset.2019.11153.
Full textSubasree, S., Michael Jeniston S. Christ, M. Harish, V. Jeevaranjan, and S. Manikandan. "Enhanced Security through Intrusion Detection and Prevention System." Recent Trends in Cyber Criminology Research 1, no. 2 (2025): 1–5. https://doi.org/10.5281/zenodo.15582270.
Full textSreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.
Full textSharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.
Full textKorcak, Michal, Jaroslav Lamer, and Frantisek Jakab. "Intrusion Prevention/Intrusion Detection System (IPS/IDS) for Wifi Networks." International journal of Computer Networks & Communications 6, no. 4 (2014): 77–89. http://dx.doi.org/10.5121/ijcnc.2014.6407.
Full textGandhar, Abhishek, Prakhar Priyadarshi, Shashi Gandhar, S. B. Kumar, Arvind Rehalia, and Mohit Tiwari. "An Effective Deep Learning Model Design for Cyber Intrusion Prevention System." Indian Journal Of Science And Technology 18, no. 10 (2025): 811–15. https://doi.org/10.17485/ijst/v18i10.318.
Full textChandre, Pankaj Ramchandra, Parikshit Mahalle, and Gitanjali Shinde. "Intrusion prevention system using convolutional neural network for wireless sensor network." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504. http://dx.doi.org/10.11591/ijai.v11.i2.pp504-515.
Full textPankaj, Chandre, Mahalle Parikshit, and Shinde Gitanjali. "Intrusion prevention system using convolutional neural network for wireless sensor network." International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504–15. https://doi.org/10.11591/ijai.v11.i2.pp504-515.
Full textGuo, Hui Ling. "Research on the Model of Database Intrusion Protection System Based on E-Commerce Platform." Applied Mechanics and Materials 336-338 (July 2013): 2559–62. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2559.
Full textAnand, Saloni, and Kshitij Patne. "Network Intrusion Detection and Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3754–59. http://dx.doi.org/10.22214/ijraset.2022.44761.
Full textOnwodi, Greg. "Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, FCT, Abuja, Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 73–78. http://dx.doi.org/10.22624/aims/digital/v10n4p10.
Full textShirsat,, Yashraj. "Smart Farmland for Crop Prevention & Animal Intrusion Detection Using IOT." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41299.
Full textMurugan, S., and K. Kuppusamy. "Intelligence Intrusion Multi Detection Prevention System Principles." i-manager's Journal on Software Engineering 10, no. 1 (2015): 31–41. http://dx.doi.org/10.26634/jse.10.1.3630.
Full textBocu, Razvan, and Maksim Iavich. "Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks." Symmetry 15, no. 1 (2022): 110. http://dx.doi.org/10.3390/sym15010110.
Full textUgale, Archana R., and Amol D. Potgantwar. "Anomaly Based Intrusion Detection through Efficient Machine Learning Model." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 616–22. http://dx.doi.org/10.37391/ijeer.110251.
Full textS, Bhaggiaraj, Shanthini S, Sugantha Mallika S.S., and Muthuram R. "NEXT-GENERATION INTRUSION DETECTION AND PREVENTION SYSTEMS FOR IT AND NETWORK SECURITY." ICTACT Journal on Communication Technology 14, no. 3 (2023): 2992–97. http://dx.doi.org/10.21917/ijct.2023.0445.
Full textJiang, Ya Ping, Shi Hui Cheng, and Yong Gan. "Network Security Prevention Model Based-Immune." Applied Mechanics and Materials 16-19 (October 2009): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.881.
Full textErskine, Samuel Kofi. "Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning." Applied System Innovation 8, no. 2 (2025): 52. https://doi.org/10.3390/asi8020052.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textSuryayusra, Suryayusra, and Dedi Irawan. "PERBANDINGAN INTRUSION PREVENTION SYSTEM (IPS) PADA LINUX UBUNTU DAN LINUX CENTOS." Jurnal Teknologi Informasi Mura 12, no. 02 (2020): 131–44. http://dx.doi.org/10.32767/jti.v12i02.1023.
Full textVargas Martínez, Cyntia, and Birgit Vogel-Heuser. "Towards Industrial Intrusion Prevention Systems: A Concept and Implementation for Reactive Protection." Applied Sciences 8, no. 12 (2018): 2460. http://dx.doi.org/10.3390/app8122460.
Full textBenisha, R. B., and S. Raja Ratna. "Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks." Security and Communication Networks 2019 (November 22, 2019): 1–12. http://dx.doi.org/10.1155/2019/1082485.
Full textThenmozhi, K., and R. Sabin Begum. "Intrusion Prevention in Cloud Computing Using Blockchain." Data Analytics and Artificial Intelligence 4, no. 3 (2024): 8–13. http://dx.doi.org/10.46632/daai/4/3/2.
Full textVeerasingam, Prakaash, Shukor Abd Razak, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, and Siti Dhalila Mohd Satar. "INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA." Malaysian Journal of Computing and Applied Mathematics 6, no. 1 (2023): 21–30. http://dx.doi.org/10.37231/myjcam.2023.6.1.88.
Full textAlazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.
Full textMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Full textMs., Deepali D. Rane, Shraddha T. Shelar Mrs., and Vinod Mane Mr. "Survey on Detection and Prevention of Intrusion." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2500–2502. https://doi.org/10.31142/ijtsrd15660.
Full textTetskyi, Artem, та Artem Perepelitsyn. "Можливості використання апаратних прискорювачів у системах виявлення та запобігання вторгненням". Aerospace Technic and Technology, № 6 (21 листопада 2024): 94–102. https://doi.org/10.32620/aktt.2024.6.09.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textKurniawan, Rifky, and Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan." SENTINEL 3, no. 1 (2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.
Full textKhadafi, Shah, Budanis Dwi Meilani, and Samsul Arifin. "SISTEM KEAMANAN OPEN CLOUD COMPUTING MENGGUNAKAN IDS (INTRUSION DETECTION SYSTEM) DAN IPS (INTRUSION PREVENTION SYSTEM)." Jurnal IPTEK 21, no. 2 (2017): 67. http://dx.doi.org/10.31284/j.iptek.2017.v21i2.207.
Full textAtmadji, Ery Setiyawan Jullev, Bekti Maryuni Susanto, and Rahardian Wiratama. "Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server." Teknika 6, no. 1 (2017): 19–23. http://dx.doi.org/10.34148/teknika.v6i1.55.
Full textNycz, Mariusz, Mirosław Hajder, and Alicja Gerka. "New architecture of system intrusion detection and prevention." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 20. http://dx.doi.org/10.17951/ai.2016.16.2.20.
Full textLetou, Kopelo, Dhruwajita Devi, and Y. Jayanta Singh. "Host-based Intrusion Detection and Prevention System (HIDPS)." International Journal of Computer Applications 69, no. 26 (2013): 28–33. http://dx.doi.org/10.5120/12136-8419.
Full textMaqboolBeigh, Bilal, Uzair Bashir, and Manzoor Chahcoo. "Intrusion Detection and Prevention System: Issues and Challenges." International Journal of Computer Applications 76, no. 17 (2013): 26–30. http://dx.doi.org/10.5120/13340-0701.
Full textJo, Jinyong, Heejin Jang, Kyungmin Lee, and JongUk Kong. "SDN-Based Intrusion Prevention System for Science DMZ." Journal of Korean Institute of Communications and Information Sciences 40, no. 6 (2015): 1070–80. http://dx.doi.org/10.7840/kics.2015.40.6.1070.
Full textDave, Sweta, and Prof Sandip Chauhan. "Intrusion Detection and Prevention System in IoT Environment." International Journal of Research in Advent Technology 7, no. 3 (2019): 1498–502. http://dx.doi.org/10.32622/ijrat.732019124.
Full textLYUBENOVA, Simona, Milen PETROV та Adelina ALEKSIEVA - PETROVA. "А Graph Database Intrusion Detection and Prevention System". Eurasia Proceedings of Science Technology Engineering and Mathematics 29 (15 грудня 2024): 182–91. https://doi.org/10.55549/epstem.1566169.
Full text