Journal articles on the topic 'Network-based IDPS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network-based IDPS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shalvi, Dave, Trivedi Bhushan, and Mahadevia Jimit. "EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WIRED AND WIRELESS ENVIRONMENT." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 103–15. https://doi.org/10.5281/zenodo.3980296.
Full textDubey, Bhanu Prakash. "A Machine Learning-based Approach for Intrusion Detection and Prevention in Computer Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2076–86. http://dx.doi.org/10.17762/turcomat.v11i3.13605.
Full textHadi, Hassan Jalil, Mubashir Adnan, Yue Cao, et al. "iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF." Technologies 12, no. 8 (2024): 122. http://dx.doi.org/10.3390/technologies12080122.
Full textKulkarni, Prakash, Vitor B. P. Leite, Susmita Roy, et al. "Intrinsically disordered proteins: Ensembles at the limits of Anfinsen's dogma." Biophysics Reviews 3, no. 1 (2022): 011306. http://dx.doi.org/10.1063/5.0080512.
Full textEt. al., K. NandhaKumar,. "A Hybrid Adaptive Development Algorithm and Machine Learning Based Method for Intrusion Detection and Prevention System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (2021): 1226–36. http://dx.doi.org/10.17762/turcomat.v12i5.1789.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textIbnu, Hunais, Yamin Muh., and Subardin. "PENERAPAN KEAMANAN JARINGAN MENGGUNAKAN METODE HOST BASED IDPS WLAN DAN LAN BERBASIS WEB DAN SMS GATEWAY." semanTIK Vol 6 No 1 Jan-Jun 2020 (June 20, 2020): 131–38. https://doi.org/10.5281/zenodo.3892958.
Full textG., Florance, and R. J. Anandhi. "Empowering SDN with DDoS attack detection: leveraging hybrid machine learning based IDPS controller for robust security." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 3 (2025): 2479. https://doi.org/10.11591/ijai.v14.i3.pp2479-2489.
Full textBálint, Krisztián. "Possible Cisco-based Fire Protection Solutions in Education Institutions." Műszaki Tudományos Közlemények 11, no. 1 (2019): 31–34. http://dx.doi.org/10.33894/mtk-2019.11.04.
Full textSubasree, S., Michael Jeniston S. Christ, M. Harish, V. Jeevaranjan, and S. Manikandan. "Enhanced Security through Intrusion Detection and Prevention System." Recent Trends in Cyber Criminology Research 1, no. 2 (2025): 1–5. https://doi.org/10.5281/zenodo.15582270.
Full textDuff, Eugene, Fernando Zelaya, Fidel Alfaro Almagro, et al. "Reliability of multi-site UK Biobank MRI brain phenotypes for the assessment of neuropsychiatric complications of SARS-CoV-2 infection: The COVID-CNS travelling heads study." PLOS ONE 17, no. 9 (2022): e0273704. http://dx.doi.org/10.1371/journal.pone.0273704.
Full textFang, Chun, Yoshitaka Moriwaki, Aikui Tian, Caihong Li, and Kentaro Shimizu. "Identifying short disorder-to-order binding regions in disordered proteins with a deep convolutional neural network method." Journal of Bioinformatics and Computational Biology 17, no. 01 (2019): 1950004. http://dx.doi.org/10.1142/s0219720019500045.
Full textFang, Chun, Yoshitaka Moriwaki, Caihong Li, and Kentaro Shimizu. "MoRFPred_en: Sequence-based prediction of MoRFs using an ensemble learning strategy." Journal of Bioinformatics and Computational Biology 17, no. 06 (2019): 1940015. http://dx.doi.org/10.1142/s0219720019400158.
Full textRoopesh, Ms. "CYBERSECURITY SOLUTIONS AND PRACTICES: FIREWALLS, INTRUSION DETECTION/PREVENTION, ENCRYPTION, MULTI-FACTOR AUTHENTICATION." ACADEMIC JOURNAL ON BUSINESS ADMINISTRATION, INNOVATION & SUSTAINABILITY 4, no. 3 (2024): 37–52. http://dx.doi.org/10.69593/ajbais.v4i3.90.
Full textFarea, Ali H., and Kerem Küçük. "Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja." International Journal of Computer Network and Information Security 16, no. 1 (2024): 1–23. http://dx.doi.org/10.5815/ijcnis.2024.01.01.
Full textJiang, Xiaoming, Wouter Van den Broek, and Christoph T. Koch. "Inverse dynamical photon scattering (IDPS): an artificial neural network based algorithm for three-dimensional quantitative imaging in optical microscopy." Optics Express 24, no. 7 (2016): 7006. http://dx.doi.org/10.1364/oe.24.007006.
Full textV, Balajishanmugam, Christopher Paul A, and Thirunavukarasu B. "ENHANCED INTRUSION DETECTION AND PREVENTION IN WIRELESS SENSOR NETWORKS USING HYBRID DEEP LEARNING." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3454–58. https://doi.org/10.21917/ijct.2025.0513.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textBai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.
Full textS, Bhaggiaraj, Shanthini S, Sugantha Mallika S.S., and Muthuram R. "NEXT-GENERATION INTRUSION DETECTION AND PREVENTION SYSTEMS FOR IT AND NETWORK SECURITY." ICTACT Journal on Communication Technology 14, no. 3 (2023): 2992–97. http://dx.doi.org/10.21917/ijct.2023.0445.
Full textKayembe, Harry César, Didier Bompangue, Catherine Linard, et al. "Drivers of the dynamics of the spread of cholera in the Democratic Republic of the Congo, 2000–2018: An eco-epidemiological study." PLOS Neglected Tropical Diseases 17, no. 8 (2023): e0011597. http://dx.doi.org/10.1371/journal.pntd.0011597.
Full textChen, Tongtong, and Xiangxue Li. "(Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications." Entropy 23, no. 11 (2021): 1495. http://dx.doi.org/10.3390/e23111495.
Full textMeng, Di, and Gianluca Pollastri. "PUNCH2: Explore the strategy for intrinsically disordered protein predictor." PLOS ONE 20, no. 3 (2025): e0319208. https://doi.org/10.1371/journal.pone.0319208.
Full textBashynsky, V., Yu Kliat, and A. Trystan. "METHODOLOGICAL APPROACH TO FORECASTING SOURCES OF MILITARY THREATS TO ENSURING THE MILITARY SECURITY OF UKRAINE." Випробування та сертифікація, no. 3(5) (December 30, 2024): 14–19. https://doi.org/10.37701/ts.05.2024.02.
Full textGuo, Hao-Bo, Baxter Huntington, Alexander Perminov, et al. "AlphaFold2 modeling and molecular dynamics simulations of an intrinsically disordered protein." PLOS ONE 19, no. 5 (2024): e0301866. http://dx.doi.org/10.1371/journal.pone.0301866.
Full textPramudya, Otniel Dewangga Divan, Puspanda Hatta, and Cucuk Wawan Budiyanto. "MODELING INTRUSION DETECTION AND PREVENTION SYSTEM TO DETECT AND PREVENT NETWORK ATTACKS USING WAZUH." Jurnal Teknik Informatika (Jutif) 6, no. 1 (2025): 173–86. https://doi.org/10.52436/1.jutif.2025.6.1.1830.
Full textNayana R, Harish G N, and Asharani R. "A comprehensive survey of modern network security techniques and challenges." World Journal of Advanced Research and Reviews 3, no. 2 (2019): 101–10. http://dx.doi.org/10.30574/wjarr.2019.3.2.0069.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textMironeanu, Cătălin, Alexandru Archip, Cristian-Mihai Amarandei, and Mitică Craus. "Experimental Cyber Attack Detection Framework." Electronics 10, no. 14 (2021): 1682. http://dx.doi.org/10.3390/electronics10141682.
Full textHuang, Jingfeng, Istvan Laszlo, Lorraine A. Remer, et al. "Screening for snow/snowmelt in SNPP VIIRS aerosol optical depth algorithm." Atmospheric Measurement Techniques 11, no. 10 (2018): 5813–25. http://dx.doi.org/10.5194/amt-11-5813-2018.
Full textKarmous, Neder, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Lamia Romdhani, and Neji Youssef. "Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices." Sensors 24, no. 15 (2024): 5022. http://dx.doi.org/10.3390/s24155022.
Full textOnyechere, Udoka, Toibat Adeyinka, Eghonghon Abumere, and Ada Ugochukwu. "Providing Virtual Psychosocial and Trauma Support to Displaced Women in Nigeria: A Case Study of Courage, Innovation and Collaboration; Core Values and Behaviours of the Royal College of Psychiatrists." BJPsych Open 11, S1 (2025): S313—S314. https://doi.org/10.1192/bjo.2025.10753.
Full textD, Rajagopal, and Padmanabhan K. "Artificial Intelligence Based Multi-Layer Approach for Finding Unknown Attacks in Cloud Network by Using Hybrid Intrusion Detection." Indian Journal of Science and Technology 17, no. 35 (2024): 3643–52. https://doi.org/10.17485/IJST/v17i35.2209.
Full textLiu, Xiaoguang, Huanliang Li, Cunguang Lou, Tie Liang, Xiuling Liu, and Hongrui Wang. "A New Approach to Fall Detection Based on Improved Dual Parallel Channels Convolutional Neural Network." Sensors 19, no. 12 (2019): 2814. http://dx.doi.org/10.3390/s19122814.
Full textYan, Binghao, and Guodong Han. "LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/6026878.
Full textBassam, Hasan, Alani Sameer, and Ayad Saad Mohammed. "Secured node detection technique based on artificial neural network for wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 536–44. https://doi.org/10.11591/ijece.v11i1.pp536-544.
Full textD., Parameswari, and Khanaa V. "Network Based Intrusion Detection System using Protocol Standardization Techniques." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 191–94. https://doi.org/10.35940/ijeat.B3351.129219.
Full textClavijo-López, Rosa, Dr Wayky Alfredo Luy Navarrete, Dr Jesús Merino Velásquez, Dr Carlos Miguel Aguilar Saldaña, Alcides Muñoz Ocas, and Dr César Augusto Flores Tananta. "Integrating Novel Machine Learning for Big Data Analytics and IoT Technology in Intelligent Database Management Systems." Journal of Internet Services and Information Security 14, no. 1 (2024): 206–18. http://dx.doi.org/10.58346/jisis.2024.i1.014.
Full textJo, Dae Woong, and Myung Ho Kim. "Design and Implementation for the Secure ID Management System Based on Virtualization." Applied Mechanics and Materials 284-287 (January 2013): 3390–94. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3390.
Full textJumabek, Alikhanov, SeungSam Yang, and YoungTae Noh. "CatBoost-Based Network Intrusion Detection on Imbalanced CIC-IDS-2018 Dataset." Journal of Korean Institute of Communications and Information Sciences 46, no. 12 (2021): 2191–97. http://dx.doi.org/10.7840/kics.2021.46.12.2191.
Full textJyoti, Snehi, Bhandari Abhinav, Baggan Vidhu, and Snehi Ritu Manish. "Diverse Methods for Signature based Intrusion Detection Schemes Adopted." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 44–49. https://doi.org/10.35940/ijrte.A2791.079220.
Full textLI, L., M. ZAHEERUDDIN, SUNG-HWAN CHO, and SANG-HOON JUNG. "STEADY STATE AND DYNAMIC MODELING OF AN INDIRECT DISTRICT HEATING SYSTEM." International Journal of Air-Conditioning and Refrigeration 18, no. 01 (2010): 61–75. http://dx.doi.org/10.1142/s2010132510000083.
Full textAbu Al-Haija, Qasem, and Saleh Zein-Sabatto. "An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks." Electronics 9, no. 12 (2020): 2152. http://dx.doi.org/10.3390/electronics9122152.
Full textLi, Xiaoya, Chenyang Zhang, Zhoujin Tan, and Jiali Yuan. "Network Pharmacology-Based Analysis of Gegenqinlian Decoction Regulating Intestinal Microbial Activity for the Treatment of Diarrhea." Evidence-Based Complementary and Alternative Medicine 2021 (July 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/5520015.
Full textGao, Ze. "A review on statistical language and neural network based code completion." Applied and Computational Engineering 22, no. 1 (2023): 233–39. http://dx.doi.org/10.54254/2755-2721/22/20231222.
Full textSinha, Subrata, Sanchita Sharma, Surabhi Johari, Ashwani Sharma, and Sanchaita Rajkhowa. "Design and Development of Hydrophobicity and Net charge Based Artificial Neural Network Model for IDP/IDPR Prediction." Procedia Computer Science 218 (2023): 438–48. http://dx.doi.org/10.1016/j.procs.2023.01.026.
Full textJi, Ram, Neerendra Kumar, and Devanand Padha. "Hybrid Enhanced Intrusion Detection Frameworks for Cyber-Physical Systems via Optimal Features Selection." Indian Journal Of Science And Technology 17, no. 30 (2024): 3069–79. http://dx.doi.org/10.17485/ijst/v17i30.1794.
Full textRam, Ji, Kumar Neerendra, and Padha Devanand. "Hybrid Enhanced Intrusion Detection Frameworks for Cyber-Physical Systems via Optimal Features Selection." Indian Journal of Science and Technology 17, no. 30 (2024): 3069–79. https://doi.org/10.17485/IJST/v17i30.1794.
Full textKaye, Deborah R., Hye Sung Min, Edward C. Norton, et al. "System-Level Health-Care Integration and the Costs of Cancer Care Across the Disease Continuum." Journal of Oncology Practice 14, no. 3 (2018): e149-e157. http://dx.doi.org/10.1200/jop.2017.027730.
Full text