Journal articles on the topic 'Network intrusion detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network intrusion detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Priyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textSreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textAbdulhameed, Abbas A., Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan. "An optimized model for network intrusion detection in the network operating system environment." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 75–85. http://dx.doi.org/10.58496/mjcs/2024/017.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textA P, Niharika. "Deep Learning Approach for Intrusion Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33646.
Full textQazi, Emad Ul Haq, Muhammad Hamza Faheem, and Tanveer Zia. "HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System." Applied Sciences 13, no. 8 (2023): 4921. http://dx.doi.org/10.3390/app13084921.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (2022): 530. http://dx.doi.org/10.3390/math10030530.
Full textJyoti, Snehi, Bhandari Abhinav, Baggan Vidhu, and Snehi Ritu Manish. "Diverse Methods for Signature based Intrusion Detection Schemes Adopted." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 44–49. https://doi.org/10.35940/ijrte.A2791.079220.
Full textBattini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.
Full textLi, Yimin, Dezhi Han, Mingming Cui, Fan Yuan, and Yachao Zhou. "RESNETCNN: An abnormal network traffic flows detection model." Computer Science and Information Systems, no. 00 (2023): 4. http://dx.doi.org/10.2298/csis221124004l.
Full textMahendra S Dalvi. "Machine Learning Based Intrusion Detection System." Journal of Information Systems Engineering and Management 10, no. 36s (2025): 550–55. https://doi.org/10.52783/jisem.v10i36s.6528.
Full textMeliboev, Azizjon. "IOT NETWORK INTRUSION DETECTION SYSTEM USING MACHINE LEARNING TECHNIQUES." QO‘QON UNIVERSITETI XABARNOMASI 11 (June 30, 2024): 112–15. http://dx.doi.org/10.54613/ku.v11i11.972.
Full textSudhanshu, Sekhar Tripathy, and Behera Bichitrananda. "EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM." Industrial Engineering Journal 53, no. 10 (2024): 18–40. https://doi.org/10.5281/zenodo.14213834.
Full textPriya, Ms Siva. "Intrusion Detection System Using Probabilistic Adaptive Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 1222–25. http://dx.doi.org/10.22214/ijraset.2024.61565.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textHasan, Mokhtar Mohammed, and Noor Adnan Ibraheem. "APPLYING ADAPTIVE FUZZY NEURAL ALGORITHM FOR INTRUSION DETECTION." Journal of Engineering 16, no. 01 (2010): 4488–509. http://dx.doi.org/10.31026/j.eng.2010.01.08.
Full textBhelkar,, Mr Sahil. "Network Intrusion Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31278.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textLafta, Hameed. "Network Intrusion Detection Using Optimal Perception with Cuckoo Algorithm." Wasit Journal for Pure sciences 3, no. 1 (2024): 95–105. http://dx.doi.org/10.31185/wjps.326.
Full textLama, Amin, and Dr Preeti Savant. "A SURVEY ON NETWORK-BASED INTRUSION DETECTION SYSTEMS USING MACHINE LEARNING ALGORITHMS." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (2022): 225–30. http://dx.doi.org/10.33564/ijeast.2022.v06i09.031.
Full textBhavini Ahir, Bhavini Ahir, Prachi Tambakhe, and Dr Kalpesh Lad Dr. Kalpesh Lad. "Open Source Intelligent Network Intrusion Detection System Analyzer." Indian Journal of Applied Research 2, no. 3 (2011): 84–87. http://dx.doi.org/10.15373/2249555x/dec2012/27.
Full textHussein, Salam Allawi, Alyaa Abduljawad Mahmood, and Emaan Oudah Oraby. "Network Intrusion Detection System Using Ensemble Learning Approaches." Webology 18, SI05 (2021): 962–74. http://dx.doi.org/10.14704/web/v18si05/web18274.
Full textMajeed, Dr Saad K., Dr Soukaena H. Hashem, and Ikhlas K. Gbashi. "Proposal to WNIDS Wireless Network Intrusion Detection System." International Journal of Scientific Research 2, no. 10 (2012): 4–8. http://dx.doi.org/10.15373/22778179/oct2013/29.
Full textBoskany, Najmadin Wahid. "Design of Alarm Based Network Intrusion Detection System." Journal of Zankoy Sulaimani - Part A 16, no. 2 (2014): 65–69. http://dx.doi.org/10.17656/jzs.10294.
Full textLiu, Gui Guo. "Intrusion Detection Systems." Applied Mechanics and Materials 596 (July 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textVaishnavi, Vali Sai Jitha. "Advance Network Intrusion Detection System Using Deep Learning Techniques." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47507.
Full textKumar, Abhijeet. "Enhancing Network Security with Tree-Based Machine Learning: A Study on Ensemble Intrusion Detection System Models." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1417–22. https://doi.org/10.22214/ijraset.2025.67586.
Full textEt. al., T. Sushma,. "A Review of the cluster based Mobile Adhoc Network Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2070–76. http://dx.doi.org/10.17762/turcomat.v12i2.1811.
Full textResearcher. "AN APPLICATION OF LINEAR DISCRIMINANT ANALYSIS IN THE DESIGN OF INTRUSION DETECTION SYSTEM (LINEAR DISCRIMINANT ANALYSIS & INTRUSION DETECTION SYSTEM)." International Journal of Information Security (IJIS) 3, no. 2 (2024): 13–24. https://doi.org/10.5281/zenodo.14504686.
Full textSk, Mr Shafiulilah. "AI-Driven Network Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1481–86. https://doi.org/10.22214/ijraset.2025.67539.
Full textVerma, Anil, Enish Paneru, and Bishal Baaniya. "Anomaly-Based Network Intrusion Detection System." Journal of Lumbini Engineering College 4, no. 1 (2022): 38–42. http://dx.doi.org/10.3126/lecj.v4i1.49364.
Full textAzarudeen, K., Dasthageer Ghulam, G. Rakesh, Balaji Sathaiah, and Raj Vishal. "Intrusion Detection System Using Machine Learning by RNN Method." E3S Web of Conferences 491 (2024): 04012. http://dx.doi.org/10.1051/e3sconf/202449104012.
Full textA. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textRiyad, A. M., S. Irfan Ahmed M., and L. Raheemaa Khan R. "An adaptive distributed intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4951–60. https://doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textJeevaraj, Deepa, B. Karthik, T. Vijayan, and M. Sriram. "Feature Selection Model using Naive Bayes ML Algorithm for WSN Intrusion Detection System." International journal of electrical and computer engineering systems 14, no. 2 (2023): 179–85. http://dx.doi.org/10.32985/ijeces.14.2.7.
Full textZhang, Ruohao, Jean-Philippe Condomines, and Emmanuel Lochin. "A Multifractal Analysis and Machine Learning Based Intrusion Detection System with an Application in a UAS/RADAR System." Drones 6, no. 1 (2022): 21. http://dx.doi.org/10.3390/drones6010021.
Full textDeshpande, Apoorva. "A Review on Intrusion Detection System using Artificial Intelligence Approach." SMART MOVES JOURNAL IJOSCIENCE 4, no. 8 (2018): 6. http://dx.doi.org/10.24113/ijoscience.v4i8.153.
Full textShrikant, Vanve* Prof. Sarita Patil. "OGEDIDS: OPPOSITIONAL GENETIC PROGRAMMING ENSEMBLE FOR DISTRIBUTED INTRUSION DETECTION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 756–62. https://doi.org/10.5281/zenodo.57737.
Full textPhadatare, Yash. "Network Intrusion Monitoring System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43029.
Full textKhazane, Hassan, Mohammed Ridouani, Fatima Salahdine, and Naima Kaabouch. "IoT Network Security based on Intrusion Detection System using Stacked Ensemble." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 22 (June 25, 2025): 466–73. https://doi.org/10.37394/23209.2025.22.38.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textKumar, K. Praveen. "Network Based Intrusion Detection System Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48304.
Full textRitu Rani. "Layered Intrusion Detection System for Wireless Network." Journal of Information Systems Engineering and Management 10, no. 53s (2025): 764–73. https://doi.org/10.52783/jisem.v10i53s.10973.
Full textShinde, Prof Ms S. P. "AI-Based Network Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 1586–93. http://dx.doi.org/10.22214/ijraset.2024.58620.
Full text