Academic literature on the topic 'Network intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network intrusion detection system"
Priyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textSreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textAbdulhameed, Abbas A., Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan. "An optimized model for network intrusion detection in the network operating system environment." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 75–85. http://dx.doi.org/10.58496/mjcs/2024/017.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textA P, Niharika. "Deep Learning Approach for Intrusion Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33646.
Full textQazi, Emad Ul Haq, Muhammad Hamza Faheem, and Tanveer Zia. "HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System." Applied Sciences 13, no. 8 (2023): 4921. http://dx.doi.org/10.3390/app13084921.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (2022): 530. http://dx.doi.org/10.3390/math10030530.
Full textDissertations / Theses on the topic "Network intrusion detection system"
Maharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.
Full textMoten, Daryl, and Farhad Moazzami. "Telemetry Network Intrusion Detection Test Bed." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579527.
Full textLangin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.
Full textAdemi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.
Full textFleming, Theodor, and Hjalmar Wilander. "Network Intrusion and Detection : An evaluation of SNORT." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.
Full textHashmi, Adeel. "Hardware Acceleration of Network Intrusion Detection System Using FPGA." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.526973.
Full textStanley, Fred Philip. "Intrusion detection and response for system and network attacks." [Ames, Iowa : Iowa State University], 2009.
Find full textCaulkins, Bruce. "SESSION-BASED INTRUSION DETECTION SYSTEM TO MAP ANOMALOUS NETWORK TRAFFIC." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3466.
Full textGoh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Full textKarkera, Akhil Narayan. "Design and implementation of a policy-based intrusion detection system generic intrusion detection model for a distributed network /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000550.
Full textBooks on the topic "Network intrusion detection system"
Ning, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Springer US, 2004.
Find full textStephen, Northcutt, and Edmead Mark T, eds. Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. New Riders, 2003.
Find full textGhorbani, Ali A., Wei Lu, and Mahbod Tavallaee. Network Intrusion Detection and Prevention. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-88771-5.
Full textKim, Kwangjo, Muhamad Erza Aminanto, and Harry Chandra Tanuwidjaja. Network Intrusion Detection using Deep Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1444-5.
Full textMarchette, David J. Computer Intrusion Detection and Network Monitoring. Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4.
Full textJudy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. New Riders, 2001.
Find full textManu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Thomson Course Technology PTR, 2008.
Find full textEscamilla, Terry. Intrusion detection: Network security beyond the firewall. John Wiley, 1998.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. Springer, 2010.
Find full textBook chapters on the topic "Network intrusion detection system"
Griffith, SueAnne, and Thomas H. Morris. "Network Intrusion Detection System." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. https://doi.org/10.1007/978-3-642-27739-9_1491-1.
Full textGriffith, SueAnne, and Thomas H. Morris. "Network Intrusion Detection System." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1491.
Full textRosenberg, Ishai, and Ehud Gudes. "Evading System-Calls Based Intrusion Detection Systems." In Network and System Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_14.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_13.
Full textCho, Hyeyoung, Daeyoung Kim, Juhong Kim, Yoonmee Doh, and Jongsoo Jang. "Network Processor Based Network Intrusion Detection System." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25978-7_98.
Full textDeshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. "A Network-Based Intrusion Detection System." In Studies in Big Data. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3_3.
Full textPark, Woo Young, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, and Hyeon Jo. "Intrusion Detection System for Industrial Network." In Lecture Notes in Networks and Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16075-2_48.
Full textQassim, Qais Saif, Norziana Jamil, and Mohammed Najah Mahdi. "Symptoms-Based Network Intrusion Detection System." In Advances in Visual Informatics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90235-3_42.
Full textConference papers on the topic "Network intrusion detection system"
Beg, Mirza Ibrahim, and Mohd Yousuf Ansari. "Network Intrusion Detection System using Autoencoders." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10931842.
Full textParekh, Nishank, Arzob Sen, P. Rajasekaran, J. D. Dorathi Jayaseeli, and P. Robert. "Network Intrusion Detection System Using Optuna." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823298.
Full textOroian, David, Roland Bolboaca, Adrian-Silviu Roman, and Virgil Dobrota. "Network Intrusion Detection System Using Anomaly Detection Techniques." In 2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2024. https://doi.org/10.1109/iccp63557.2024.10793023.
Full textSetiawan, Andrih, Agung Mulyo Widodo, Gerry Firmansyah, Nenden Siti Fatonah, Budi Tjahjono, and Andika Wisnujati. "Network Intrusion Detection Using 1D Convolutional Neural Networks." In 2024 4th International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS). IEEE, 2024. https://doi.org/10.1109/ice3is62977.2024.10775512.
Full textGarg, Ishaan, Priyansh Sharma, Gurveer Singh, Purushottam Sharma, and Vansh Sharma. "Network Intrusion Detection System: Machine Learning Approach." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00045.
Full textMonteiro, João, and Bruno Sousa. "eBPF Intrusion Detection System with XDP Offload support." In 2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 2024. https://doi.org/10.1109/nfv-sdn61811.2024.10807487.
Full textPatil, Harshal, Yogesh Lohumi, K. M. Tejaswini, H. C. Sudheendramouli, Swapnil Parikh, and Ramya Maranan. "Distributed Machine Learning System for Intrusion Detection." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691032.
Full textSilva Neto, Manuel Gonçalves da, and Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Full textPrasad, Romesh, and Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.
Full textS. P, Sujini, AnbuShamini G. N, and Prija J. S. "Deep Intrusion Detection for DOS and DDOS Attacks Using LSTM and Deep Autoencoder Neural Network." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qkfn6548/ngcesi23p93.
Full textReports on the topic "Network intrusion detection system"
Zage, Dolores M., and Wayne M. Zage. Intrusion Detection System Visualization of Network Alerts. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada532723.
Full textHeady, R., G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/425295.
Full textChen, Yan. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1108982.
Full textHeady, R., G. F. Luger, A. B. Maccabe, M. Servilla, and J. Sturtevant. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/425286.
Full textKemmer, Richard A., and Giovanni Vigna. A Model-Based Real-Time Intrusion Detection System for Large Scale Heterogeneous Networks. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada420824.
Full textTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full textMcLain, C. D., A. Studer, and R. P. Lippmann. Making Network Intrusion Detection Work With IPsec. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada468587.
Full textYe, Nong. Computer Network Equipment for Intrusion Detection Research. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada381649.
Full textLundy, Philip A., George W. Pittman, and Heinz J. Pletsch. Intrusion Detection System Methodology Investigation. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada198210.
Full textGrosskopf, Michael John. Aligning Time Series for Cyber-Physical Network Intrusion Detection. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1212612.
Full text