Academic literature on the topic 'Network-based IDPS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network-based IDPS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network-based IDPS"
Shalvi, Dave, Trivedi Bhushan, and Mahadevia Jimit. "EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WIRED AND WIRELESS ENVIRONMENT." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 103–15. https://doi.org/10.5281/zenodo.3980296.
Full textDubey, Bhanu Prakash. "A Machine Learning-based Approach for Intrusion Detection and Prevention in Computer Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2076–86. http://dx.doi.org/10.17762/turcomat.v11i3.13605.
Full textHadi, Hassan Jalil, Mubashir Adnan, Yue Cao, et al. "iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF." Technologies 12, no. 8 (2024): 122. http://dx.doi.org/10.3390/technologies12080122.
Full textKulkarni, Prakash, Vitor B. P. Leite, Susmita Roy, et al. "Intrinsically disordered proteins: Ensembles at the limits of Anfinsen's dogma." Biophysics Reviews 3, no. 1 (2022): 011306. http://dx.doi.org/10.1063/5.0080512.
Full textEt. al., K. NandhaKumar,. "A Hybrid Adaptive Development Algorithm and Machine Learning Based Method for Intrusion Detection and Prevention System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (2021): 1226–36. http://dx.doi.org/10.17762/turcomat.v12i5.1789.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textIbnu, Hunais, Yamin Muh., and Subardin. "PENERAPAN KEAMANAN JARINGAN MENGGUNAKAN METODE HOST BASED IDPS WLAN DAN LAN BERBASIS WEB DAN SMS GATEWAY." semanTIK Vol 6 No 1 Jan-Jun 2020 (June 20, 2020): 131–38. https://doi.org/10.5281/zenodo.3892958.
Full textG., Florance, and R. J. Anandhi. "Empowering SDN with DDoS attack detection: leveraging hybrid machine learning based IDPS controller for robust security." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 3 (2025): 2479. https://doi.org/10.11591/ijai.v14.i3.pp2479-2489.
Full textBálint, Krisztián. "Possible Cisco-based Fire Protection Solutions in Education Institutions." Műszaki Tudományos Közlemények 11, no. 1 (2019): 31–34. http://dx.doi.org/10.33894/mtk-2019.11.04.
Full textDissertations / Theses on the topic "Network-based IDPS"
Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.
Full textLi, Zhe. "A Neural Network Based Distributed Intrusion Detection System on Cloud Platform." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1364835027.
Full textJadidi, Zahra. "Flow-based Anomaly Detection in High-Speed Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367890.
Full textGustavsson, Vilhelm. "Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253273.
Full textAl, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.
Full textStewart, IAN. "A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection." Thesis, 2009. http://hdl.handle.net/1974/1720.
Full textHelmrich, Daniel. "Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects." 2021. https://ul.qucosa.de/id/qucosa%3A75385.
Full textNwamuo, Onyekachi. "Hypervisor-based cloud anomaly detection using supervised learning techniques." Thesis, 2020. http://hdl.handle.net/1828/11503.
Full textBook chapters on the topic "Network-based IDPS"
Burkart, Nadia, Maximilian Franz, and Marco F. Huber. "Explanation Framework for Intrusion Detection." In Machine Learning for Cyber Physical Systems. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.
Full textWurzenberger, Markus, Max Landauer, Agron Bajraktari, and Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Full textJoshi, Priyanka, Ritu Prasad, Pradeep Mewada, and Praneet Saurabh. "A New Neural Network-Based IDS for Cloud Computing." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7871-2_16.
Full textCheng, Jie, Ru Zhang, Siyuan Tian, Bingjie Lin, Jiahui Wei, and Shulin Zhang. "Fusion of Traffic Data and Alert Log Based on Sensitive Information." In Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2456-9_9.
Full textNehra, Divya, Krishan Kumar, and Veenu Mangat. "Pragmatic Analysis of Machine Learning Techniques in Network Based IDS." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0108-1_39.
Full textSriram, S., A. Shashank, R. Vinayakumar, and K. P. Soman. "DCNN-IDS: Deep Convolutional Neural Network Based Intrusion Detection System." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8_7.
Full textJarke, Matthias, and Christoph Quix. "Federated Data Integration in Data Spaces." In Designing Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_11.
Full textTabia, Karim, and Philippe Leray. "Bayesian Network-Based Approaches for Severe Attack Prediction and Handling IDSs’ Reliability." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14058-7_65.
Full textHan, Mu, Pengzhou Cheng, and Shidian Ma. "CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9129-7_19.
Full textPramodya, U. J. C., K. T. Y. U. De Silva Wijesiriwardhana, K. T. D. Dharmakeerthi, E. A. K. V. Athukorala, A. N. Senarathne, and D. Tharindu. "AgentHunt: Honeypot and IDS Based Network Monitoring Device to Secure Home Networks." In Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89912-7_16.
Full textConference papers on the topic "Network-based IDPS"
Canpolat, Kursad Muratkan, and Ilhan Firat Kilincer. "Boosting Based IDS System for Local Network Intrusions." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710953.
Full textAugello, Andrea, Giuseppe Lo Re, Daniele Peri, and Partheepan Thiyagalingam. "NEP-IDS: a Network Intrusion Detection System Based on Entropy Prediction Error." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639755.
Full textPatel, N. D., V. Sudarsan Rao, and Ajeet Singh. "QDNN-IDS: Quantized Deep Neural Network based Computational Strategy for Intrusion Detection in IoT." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910857.
Full textCatillo, Marta, Antonio Pecchia, and Umberto Villano. "USB-IDS-TC: A Flow-Based Intrusion Detection Dataset of DoS Attacks in Different Network Scenarios." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013248600003899.
Full textSwetha, R., and Sudha Senthilkumar. "Genetic Algorithms-based Feature Selection (GAFS-IDS) for Attack Detection in the Internet of Medical Things Network." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687851.
Full textGladić, Dejana, Jelena Petrovački, Srđan Sladojević, Marko Arsenović, and Sonja Ristić. "IDS-based Machine Learning Model Specific for Secure Data Transmission within the Frame of IoT Network Infrastructure." In 2024 IEEE 17th International Scientific Conference on Informatics (Informatics). IEEE, 2024. https://doi.org/10.1109/informatics62280.2024.10900811.
Full textLe, Tan Nhat Linh, Boussad Ait Salem, Dave Appadoo, Nadjib Aitsaadi, and Xiaojiang Du. "AI/ML-Based IDS as 5G Core Network Function in the Control Plane for IP/non-IP CIoT Traffic." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639697.
Full textOnashoga, Adebukola, Adebayo Akinde, and Adesina Sodiya. "A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3372.
Full textLeandro, Maurício S. G. A., Paulo Freitas de Araujo-Filho, Divanilson R. Campelo, and Luigi F. Marques da Luz. "SeqWatch: Unsupervised Sequence-based Intrusion Detection System for Automotive Ethernet." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbrc.2025.5949.
Full textAdam, Norbert, Branislav Mados, Anton Balaz, and Tomas Pavlik. "Artificial neural network based IDS." In 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2017. http://dx.doi.org/10.1109/sami.2017.7880294.
Full text