Journal articles on the topic 'Network Intrusion Prevention'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Intrusion Prevention.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textMusambo, Lubasi Kakwete, Melissa K. Chinyemba, and Jackson Phiri. "Identifying Botnets Intrusion & Prevention – A Review." Zambia ICT Journal 1, no. 1 (2017): 63–68. http://dx.doi.org/10.33260/zictjournal.v1i1.28.
Full textMs. Hemangni Mehta, Ms. Anjali Nizama, and Ms. Subhashini K. "Comprehensive Review of Network Intrusion Detection and Prevention Systems." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 804–7. https://doi.org/10.51583/ijltemas.2025.140600087.
Full textAranganathan, A., and C. D. Suriyakala. "Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs." International Journal of Engineering & Technology 7, no. 2.20 (2018): 22. http://dx.doi.org/10.14419/ijet.v7i2.20.11736.
Full textSingh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textPatidar, Sadhana, Priyanka Parihar, and Chetan Agrawal. "A Review of Intrusion Detection Datasets and Techniques." SMART MOVES JOURNAL IJOSCIENCE 6, no. 3 (2020): 14–22. http://dx.doi.org/10.24113/ijoscience.v6i3.277.
Full textNinawe, Shreyash, Vilas Bariyekar, and Ranjita Asati. "Network Intrusion Prevention System." IJARCCE 8, no. 2 (2019): 196–99. http://dx.doi.org/10.17148/ijarcce.2019.8235.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textAnand, Saloni, and Kshitij Patne. "Network Intrusion Detection and Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3754–59. http://dx.doi.org/10.22214/ijraset.2022.44761.
Full textJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Full textChandre, Pankaj Ramchandra, Parikshit Mahalle, and Gitanjali Shinde. "Intrusion prevention system using convolutional neural network for wireless sensor network." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504. http://dx.doi.org/10.11591/ijai.v11.i2.pp504-515.
Full textPankaj, Chandre, Mahalle Parikshit, and Shinde Gitanjali. "Intrusion prevention system using convolutional neural network for wireless sensor network." International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504–15. https://doi.org/10.11591/ijai.v11.i2.pp504-515.
Full textSreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.
Full textBocu, Razvan, and Maksim Iavich. "Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks." Symmetry 15, no. 1 (2022): 110. http://dx.doi.org/10.3390/sym15010110.
Full textJiang, Ya Ping, Shi Hui Cheng, and Yong Gan. "Network Security Prevention Model Based-Immune." Applied Mechanics and Materials 16-19 (October 2009): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.881.
Full textDeineha, Taras, and Igor Svatovskiy. "Research of using the artificial intelligence algorithms in intrusion detection/prevention systems." Bulletin of V.N. Karazin Kharkiv National University, series «Mathematical modeling. Information technology. Automated control systems», no. 54 (June 27, 2022): 16–26. http://dx.doi.org/10.26565/2304-6201-2022-54-02.
Full textShankar, Akarshita, and Akshay Shankar. "Network Intrusion Detection and Prevention." International Journal of Applied Engineering Research 16, no. 4 (2021): 267. http://dx.doi.org/10.37622/ijaar/16.4.2021.267-270.
Full textStiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "Characterizing Network Intrusion Prevention System." International Journal of Computer Applications 14, no. 1 (2011): 11–18. http://dx.doi.org/10.5120/1811-2439.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textSharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.
Full textZhao, Wei Guo, and Gang Zhu Pan. "Application of Intrusion Prevention in Campus Network Security." Applied Mechanics and Materials 121-126 (October 2011): 4279–83. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.4279.
Full textVeerasingam, Prakaash, Shukor Abd Razak, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, and Siti Dhalila Mohd Satar. "INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA." Malaysian Journal of Computing and Applied Mathematics 6, no. 1 (2023): 21–30. http://dx.doi.org/10.37231/myjcam.2023.6.1.88.
Full textKalaivani, A., and R. Pugazendi. "CNN-RBM Integrated Deep Learning Design for Categorizing Attack in an Intrusion Detection System." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 33, no. 05 (2025): 613–22. https://doi.org/10.1142/s0218488525400070.
Full textOnwodi, Greg. "Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, FCT, Abuja, Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 73–78. http://dx.doi.org/10.22624/aims/digital/v10n4p10.
Full textSubasree, S., Michael Jeniston S. Christ, M. Harish, V. Jeevaranjan, and S. Manikandan. "Enhanced Security through Intrusion Detection and Prevention System." Recent Trends in Cyber Criminology Research 1, no. 2 (2025): 1–5. https://doi.org/10.5281/zenodo.15582270.
Full textUgale, Archana R., and Amol D. Potgantwar. "Anomaly Based Intrusion Detection through Efficient Machine Learning Model." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 616–22. http://dx.doi.org/10.37391/ijeer.110251.
Full textMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Full textSelva, Deepaa, Balakrishnan Nagaraj, Danil Pelusi, Rajendran Arunkumar, and Ajay Nair. "Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms." Algorithms 14, no. 8 (2021): 224. http://dx.doi.org/10.3390/a14080224.
Full textJeevaraj, Deepa, B. Karthik, T. Vijayan, and M. Sriram. "Feature Selection Model using Naive Bayes ML Algorithm for WSN Intrusion Detection System." International journal of electrical and computer engineering systems 14, no. 2 (2023): 179–85. http://dx.doi.org/10.32985/ijeces.14.2.7.
Full textMahesh, T. R., Vivek V, and Kumar Vinoth. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications (IJITRA) ISSN: 2583 5343 2, no. 1 (2023): 7–13. https://doi.org/10.5281/zenodo.7780113.
Full textJumba Gin, AYUBA, SANUSI Mohammed, and JIMOH Abdurrahman Annivbassa. "Robust Design and Implementation of a Network IntrusionDetection System." International Journal of Scientific and Academic Research 03, no. 12 (2023): 01–07. http://dx.doi.org/10.54756/ijsar.2023.v3.12.1.
Full textWahyudi, Farid, and Listanto Tri Utomo. "Perancangan Security Network Intrusion Prevention System Pada PDTI Universitas Islam Raden Rahmat Malang." Edumatic: Jurnal Pendidikan Informatika 5, no. 1 (2021): 60–69. http://dx.doi.org/10.29408/edumatic.v5i1.3278.
Full textTetskyi, Artem, та Artem Perepelitsyn. "Можливості використання апаратних прискорювачів у системах виявлення та запобігання вторгненням". Aerospace Technic and Technology, № 6 (21 листопада 2024): 94–102. https://doi.org/10.32620/aktt.2024.6.09.
Full textLi, Jie, and Yang Li. "Study of Application in Network Intrusion Prevention." Applied Mechanics and Materials 738-739 (March 2015): 1209–12. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1209.
Full textTahir, Sabeen, Sheikh Tahir Bakhsh, and Rayan A. Alsemmeari. "An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things." International Journal of Distributed Sensor Networks 15, no. 11 (2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889901.
Full textSafana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.
Full textSafana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.
Full textAdi Wijaya, Adi Wijaya, Toibah Umi Kalsum, and Riska. "Penerapan OPNsense Sebagai Sistem Keamanan Web Server Menggunakan Metode Host Instrusion Prevention System." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 13, no. 2 (2023): 91–100. http://dx.doi.org/10.33369/jamplifier.v13i2.31514.
Full textSiham, Aouad, El Meghrouni Issam, Sabri Yassine, Hilmani Adil, and Maizate Abderrahim. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384–91. https://doi.org/10.11591/ijres.v12.i3pp384-391.
Full textYu, Tianxiang, Yang Xin, Hongliang Zhu, Qifeng Tang, and Yuling Chen. "Network Penetration Intrusion Prediction Based on Attention Seq2seq Model." Security and Communication Networks 2022 (May 4, 2022): 1–19. http://dx.doi.org/10.1155/2022/6012232.
Full textS, Bhaggiaraj, Shanthini S, Sugantha Mallika S.S., and Muthuram R. "NEXT-GENERATION INTRUSION DETECTION AND PREVENTION SYSTEMS FOR IT AND NETWORK SECURITY." ICTACT Journal on Communication Technology 14, no. 3 (2023): 2992–97. http://dx.doi.org/10.21917/ijct.2023.0445.
Full textSuryayusra, Suryayusra, and Dedi Irawan. "PERBANDINGAN INTRUSION PREVENTION SYSTEM (IPS) PADA LINUX UBUNTU DAN LINUX CENTOS." Jurnal Teknologi Informasi Mura 12, no. 02 (2020): 131–44. http://dx.doi.org/10.32767/jti.v12i02.1023.
Full textLin, Yi-Neng, Yao-Chung Chang, Ying-Dar Lin, and Yuan-Chen Lai. "Resource allocation in network processors for network intrusion prevention systems." Journal of Systems and Software 80, no. 7 (2007): 1030–36. http://dx.doi.org/10.1016/j.jss.2007.01.032.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textGuo, Guangfeng, Junxing Zhang, and Zhanfei Ma. "Intrusion prevention with attack traceback and software-defined control plane for campus networks." Computer Science and Information Systems, no. 00 (2020): 49. http://dx.doi.org/10.2298/csis200206049g.
Full textRaniah Ali Mustafa and Haitham Salman Chyad. "Subject review: Cyber security using machine learning and deep learning techniques." Global Journal of Engineering and Technology Advances 16, no. 2 (2023): 212–19. http://dx.doi.org/10.30574/gjeta.2023.16.2.0161.
Full textRaniah, Ali Mustafa, and Salman Chyad Haitham. "Subject review: Cyber security using machine learning and deep learning techniques." Global Journal of Engineering and Technology Advances 16, no. 2 (2023): 212–19. https://doi.org/10.5281/zenodo.10625682.
Full textSamatha, Badugu, Thalakola Syamsundararao, and Nagarjuna Karyemsetty. "Deep Learning Based Intrusion Prevention System in Vehicular Network." Review of Computer Engineering Research 9, no. 3 (2022): 169–80. http://dx.doi.org/10.18488/76.v9i3.3145.
Full text