Journal articles on the topic 'NETWORK INTRUSION RESPONSE'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NETWORK INTRUSION RESPONSE.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Reshmi, B. M., S. S. Manvi, and Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks." Mobile Information Systems 2, no. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Full textAranganathan, A., and C. D. Suriyakala. "Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i2.20.11736.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (January 2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textRichard Maina Rimiru, Guanzheng Tan, and Cheruiyot Wilson. "Innate-Inspired Automated Intrusion Response Mechanism for a Network Intrusion Detection System." Journal of Convergence Information Technology 7, no. 9 (May 31, 2012): 194–201. http://dx.doi.org/10.4156/jcit.vol7.issue9.24.
Full textBraithwaite, Imothy. "Understanding Network Security Monitoring and Intrusion Response (NSMIR)." EDPACS 28, no. 8 (February 2001): 1–12. http://dx.doi.org/10.1201/1079/43265.28.8.20010201/30381.1.
Full textShameli-Sendi, Alireza, Julien Desfossez, Michel Dagenais, and Masoume Jabbarifar. "A Retroactive-Burst Framework for Automated Intrusion Response System." Journal of Computer Networks and Communications 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/134760.
Full textMalialis, Kleanthis, Sam Devlin, and Daniel Kudenko. "Distributed reinforcement learning for adaptive and robust network intrusion response." Connection Science 27, no. 3 (April 15, 2015): 234–52. http://dx.doi.org/10.1080/09540091.2015.1031082.
Full textJiang, Xue Song, Xiu Mei Wei, and Yu Shui Geng. "The Research of Intrusion Detection System Based on ANN on Cloud Platform." Applied Mechanics and Materials 263-266 (December 2012): 2962–65. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2962.
Full textG. Murugan, Dr. "Improve secure based multi-path routing to mitigate the intrusion endurance in heterogeneous wireless sensor networks." International Journal of Engineering & Technology 7, no. 4 (September 26, 2018): 2746. http://dx.doi.org/10.14419/ijet.v7i4.17957.
Full textAn, Xingshuo, Fuhong Lin, Shenggang Xu, Li Miao, and Chao Gong. "A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing." Security and Communication Networks 2018 (August 1, 2018): 1–9. http://dx.doi.org/10.1155/2018/1821804.
Full textDu, Jia Wei, Xing Zhang, Ying Zhou, and Yong Qiang Bai. "Active Defense Security Model in the Application of Network Deception System Design." Applied Mechanics and Materials 347-350 (August 2013): 2860–64. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2860.
Full textTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textLin, Tao, Peng Wu, Fengmei Gao, and Tianshu Wu. "Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation." INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL 14, no. 5 (November 17, 2019): 660. http://dx.doi.org/10.15837/ijccc.2019.5.3629.
Full textShi, Guolong, Yigang He, Lichuan Gu, and Jun Jiao. "Industry 4.0-Oriented Chipless RFID Backscatter Signal Variable Polarization Amplitude Deep Learning Coding." Wireless Communications and Mobile Computing 2021 (September 23, 2021): 1–11. http://dx.doi.org/10.1155/2021/6985420.
Full textElkabour, Ahmed, and Dr. Rahma Teirab Abaker Haroun. "Mitigating Routing Attacks in Mobile Ad Hoc Networks." International Journal for Innovation Education and Research 7, no. 7 (July 31, 2019): 227–33. http://dx.doi.org/10.31686/ijier.vol7.iss7.1603.
Full textCheng, Bing Yuan, Kai Jin Qiu, and Zu Yong Yang. "The Design of FPGA-Based Real Time Intrusion Detection NIC." Applied Mechanics and Materials 58-60 (June 2011): 2585–91. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.2585.
Full textMu, Chengpo, and Yingjiu Li. "An intrusion response decision-making model based on hierarchical task network planning." Expert Systems with Applications 37, no. 3 (March 2010): 2465–72. http://dx.doi.org/10.1016/j.eswa.2009.07.079.
Full textZhou, Xudong, Jing Wang, and Xiao Zhou. "Security Control Technology and Simulation of Network News Communication under the Environment of Internet of Things." Wireless Communications and Mobile Computing 2021 (July 17, 2021): 1–10. http://dx.doi.org/10.1155/2021/2730916.
Full textLiang, Chao, Bharanidharan Shanmugam, Sami Azam, Asif Karim, Ashraful Islam, Mazdak Zamani, Sanaz Kavianpour, and Norbik Bashah Idris. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems." Electronics 9, no. 7 (July 10, 2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Full textDi, Xiao Qiang, Hua Min Yang, and Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis." Applied Mechanics and Materials 496-500 (January 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Full textAmara Korba, Abdelaziz, Mehdi Nafaa, and Salim Ghanemi. "An efficient intrusion detection and prevention framework for ad hoc networks." Information & Computer Security 24, no. 4 (October 10, 2016): 298–325. http://dx.doi.org/10.1108/ics-08-2015-0034.
Full textKorba, Abdelaziz Amara, Mehdi Nafaa, and Salim Ghanemi. "Hybrid Intrusion Detection Framework for Ad hoc networks." International Journal of Information Security and Privacy 10, no. 4 (October 2016): 1–32. http://dx.doi.org/10.4018/ijisp.2016100101.
Full textEom, Taehoon, Jin B. Hong, SeongMo An, Jong Sou Park, and Dong Seong Kim. "A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models." Security and Communication Networks 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7235043.
Full textZhang, Yuhua, Kun Wang, Min Gao, Zhiyou Ouyang, and Siguang Chen. "LKM: A LDA-BasedK-Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/491910.
Full textLi, Daiyuan, Yongxiang Wu, Erkun Gao, Gaoxu Wang, Yi Xu, Huaping Zhong, and Wei Wu. "Simulation of Seawater Intrusion Area Using Feedforward Neural Network in Longkou, China." Water 12, no. 8 (July 24, 2020): 2107. http://dx.doi.org/10.3390/w12082107.
Full textMagán-Carrión, Roberto, José Camacho, Gabriel Maciá-Fernández, and Ángel Ruíz-Zafra. "Multivariate Statistical Network Monitoring–Sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092130. http://dx.doi.org/10.1177/1550147720921309.
Full textSamkaria, Rohit, Rajesh Singh, Anita Gehlot, Rupendra Pachauri, Amardeep Kumar, Neeraj Kumar Singh, and Kaushal Rawat. "IOT and XBee triggered based adaptive intrusion detection using geophone and quick response by UAV." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 12. http://dx.doi.org/10.14419/ijet.v7i2.6.10059.
Full textMuhammad Arifin, Fikri, Giva Andriana Mutiara, and Ismail Ismail. "Implementation of Management and Network Security Using Endian UTM Firewall." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (August 14, 2017): 43–51. http://dx.doi.org/10.25124/ijait.v1i02.874.
Full textSilaban, Andreas Jonathan, Satria Mandala, and Erwid Mustofa Jadied. "Increasing Feature Selection Accuracy through Recursive Method in Intrusion Detection System." International Journal on Information and Communication Technology (IJoICT) 4, no. 2 (April 2, 2019): 43. http://dx.doi.org/10.21108/ijoict.2018.42.216.
Full textChang, Min. "Construction of network security job service model based on rough set data analysis algorithm." Journal of Intelligent & Fuzzy Systems 39, no. 4 (October 21, 2020): 4981–87. http://dx.doi.org/10.3233/jifs-179983.
Full textGao, Jianlei, Senchun Chai, Baihai Zhang, and Yuanqing Xia. "Research on Network Intrusion Detection Based on Incremental Extreme Learning Machine and Adaptive Principal Component Analysis." Energies 12, no. 7 (March 29, 2019): 1223. http://dx.doi.org/10.3390/en12071223.
Full textSanogo, Yibayiri O., Mark Band, Charles Blatti, Saurabh Sinha, and Alison M. Bell. "Transcriptional regulation of brain gene expression in response to a territorial intrusion." Proceedings of the Royal Society B: Biological Sciences 279, no. 1749 (October 24, 2012): 4929–38. http://dx.doi.org/10.1098/rspb.2012.2087.
Full textTati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 28, 2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.
Full textAfshar, Abbas, and Ehsan Najafi. "Consequence management of chemical intrusion in water distribution networks under inexact scenarios." Journal of Hydroinformatics 16, no. 1 (July 25, 2013): 178–88. http://dx.doi.org/10.2166/hydro.2013.125.
Full textRahouma, Kamel, and Ayman Ali. "Applying Intrusion Detection and Response systems for securing the Client Data Signals in the Egyptian Optical Network." Procedia Computer Science 163 (2019): 538–49. http://dx.doi.org/10.1016/j.procs.2019.12.136.
Full textMartindale, Nathan, Muhammad Ismail, and Douglas A. Talbert. "Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data." Information 11, no. 6 (June 11, 2020): 315. http://dx.doi.org/10.3390/info11060315.
Full textJusas, Vacius, Saulius Japertas, Tautvydas Baksys, and Sandeepak Bhandari. "Logical filter approach for early stage cyber-attack detection." Computer Science and Information Systems 16, no. 2 (2019): 491–514. http://dx.doi.org/10.2298/csis190122008j.
Full textHe, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Xiao Juan Guan. "A Novel and Practical Method for Network Security Situation Prediction." Applied Mechanics and Materials 701-702 (December 2014): 907–10. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.907.
Full textRivera, Diego, Fernando Monje, Victor Villagrá, Mario Vega-Barbas, Xavier Larriva-Novo, and Julio Berrocal. "Automatic Translation and Enforcement of Cybersecurity Policies Using A High-Level Definition Language." Entropy 21, no. 12 (November 30, 2019): 1180. http://dx.doi.org/10.3390/e21121180.
Full textMurakami, Tadashi, Fukuko Yuasa, Ryouichi Baba, Teiji Nakamura, Kiyoharu Hashimoto, Soh Y. Suzuki, Mitsuo Nishiguchi, and Toshiaki Kaneko. "Long-term experiences in keeping balance between safety and usability in research activities in KEK." EPJ Web of Conferences 214 (2019): 08001. http://dx.doi.org/10.1051/epjconf/201921408001.
Full textZhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textGardine, Matt, Michael West, Cynthia Werner, and Michael Doukas. "Evidence of magma intrusion at Fourpeaked volcano, Alaska in 2006–2007 from a rapid-response seismic network and volcanic gases." Journal of Volcanology and Geothermal Research 200, no. 3-4 (March 2011): 192–200. http://dx.doi.org/10.1016/j.jvolgeores.2010.11.018.
Full textYazov, Yuri, Oleg Avsentev, Alexander Avsentev, and Irina Rubtsova. "Method for Assessing Effectiveness of Protection of Electronic Document Management using the Petri and Markov Nets Apparatus." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1269–300. http://dx.doi.org/10.15622/sp.2019.18.6.1269-1300.
Full textN., Rajendran, Jawahar P.K., and Priyadarshini R. "Makespan of routing and security in Cross Centric Intrusion Detection System (CCIDS) over black hole attacks and rushing attacks in MANET." International Journal of Intelligent Unmanned Systems 7, no. 4 (October 14, 2019): 162–76. http://dx.doi.org/10.1108/ijius-03-2019-0021.
Full textP, Muneeshwari, and Kishanthini M. "A New Framework for Anomaly Detection in NSL-KDD Dataset using Hybrid Neuro-Weighted Genetic Algorithm." Journal of Computational Science and Intelligent Technologies 1, no. 1 (2020): 29–36. http://dx.doi.org/10.53409/mnaa.jcsit1105.
Full textBurrell, Darrell Norman. "Understanding the Talent Management Intricacies of Remote Cybersecurity Teams in Covid-19 Induced Telework Organizational Ecosystems." Land Forces Academy Review 25, no. 3 (September 1, 2020): 232–44. http://dx.doi.org/10.2478/raft-2020-0028.
Full textOsuo-Genseleke, Macarthy, and Ojekudo Nathaniel. "Hybridized Design For Feature Optimization and Reduction of Intrusion Detection Systems Alert in a Correlation Framework." International Journal of Innovative Science and Research Technology 5, no. 7 (August 7, 2020): 1051–55. http://dx.doi.org/10.38124/ijisrt20jul783.
Full textPapadopoulou, Maria P., Ioannis K. Nikolos, and George P. Karatzas. "Computational benefits using artificial intelligent methodologies for the solution of an environmental design problem: saltwater intrusion." Water Science and Technology 62, no. 7 (October 1, 2010): 1479–90. http://dx.doi.org/10.2166/wst.2010.442.
Full text