Academic literature on the topic 'Online Intrusion'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online Intrusion.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Online Intrusion"
Chueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textZhang, Kai, Shoushan Luo, Yang Xin, Hongliang Zhu, and Yuling Chen. "Online Mining Intrusion Patterns from IDS Alerts." Applied Sciences 10, no. 8 (2020): 2983. http://dx.doi.org/10.3390/app10082983.
Full textZhang, Kai, Fei Zhao, Shoushan Luo, Yang Xin, Hongliang Zhu, and Yuling Chen. "Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)." Applied Sciences 10, no. 7 (2020): 2596. http://dx.doi.org/10.3390/app10072596.
Full textChaulk, Kasey, and Tim Jones. "Online Obsessive Relational Intrusion: Further Concerns About Facebook." Journal of Family Violence 26, no. 4 (2011): 245–54. http://dx.doi.org/10.1007/s10896-011-9360-x.
Full textENGEL, Raquel, Maria Alice Altenburg de ASSIS, Adriana Soares LOBO, Danielle Biazzi LEAL, Francilene Gracieli Kunradi VIEIRA, and Patrícia Faria DI PIETRO. "Validation of the Online version of the Previous Day Food Questionnaire for schoolchildren." Revista de Nutrição 30, no. 5 (2017): 627–37. http://dx.doi.org/10.1590/1678-98652017000500008.
Full textGaikwad, D. P., and R. C. Thool. "Online Anomaly Based Intrusion Detection System Using Machine Learning." i-manager's Journal on Cloud Computing 1, no. 1 (2014): 19–25. http://dx.doi.org/10.26634/jcc.1.1.2800.
Full textSalih Aref, Ismael, Ziyad Tariq Mustafa, Iraq Ali Hussain, and Samah Jalil Sabaa. "Online Intrusion Detection System using C4.5 Algorithm with Honeypot." Journal of Engineering and Applied Sciences 15, no. 5 (2019): 1127–32. http://dx.doi.org/10.36478/jeasci.2020.1127.1132.
Full textyesugade, Prof K. D. "Online Intrusion Detection System for Wide Range of Attack." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 3996–98. http://dx.doi.org/10.22214/ijraset.2018.4659.
Full textHofmann, Alexander, and Bernhard Sick. "Online Intrusion Alert Aggregation with Generative Data Stream Modeling." IEEE Transactions on Dependable and Secure Computing 8, no. 2 (2011): 282–94. http://dx.doi.org/10.1109/tdsc.2009.36.
Full textJumaa, Alaa, and Awezan Omar. "Online Database Intrusion Detection System Based on Query Signatures." Journal of University of Human Development 3, no. 1 (2017): 282–87. http://dx.doi.org/10.21928/juhd.20170315.14.
Full textDissertations / Theses on the topic "Online Intrusion"
Ahmed, Abdulbasit. "Online network intrusion detection system using temporal logic and stream data processing." Thesis, University of Liverpool, 2013. http://livrepository.liverpool.ac.uk/12153/.
Full textShafi, Kamran Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "An online and adaptive signature-based approach for intrusion detection using learning classifier systems." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/38991.
Full textAl, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.
Full textNorton, Aaron Michael. "Technology mediated communication in intimate relationships." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/18126.
Full textChen, Bo. "Byzantine Fault Tolerance for Nondeterministic Applications." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826.
Full textDamour, Gabriel. "Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic." Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252560.
Full textKim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Full textWallin, Clas, and Sara Wisseng. "Konsten att förmedla online-annonser : En studie om vilken typ av online-annonser som används för att nå ut till internetanvändare på ett mindre påträngande sätt." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-31873.
Full textTokunaga, Robert S. "Cyber-intrusions : strategies of coping with online obsessive relational intrusion." Thesis, 2007. http://hdl.handle.net/10125/20905.
Full textRibeiro, Tiago Miguel Pereira. "Online Machine Learning-enabled Network Intrusion Detection." Dissertação, 2021. https://hdl.handle.net/10216/134763.
Full textBooks on the topic "Online Intrusion"
Wacks, Raymond. 1. Privacy in peril. Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0001.
Full textBook chapters on the topic "Online Intrusion"
DeCusatis, C., P. Liengtiraphan, and A. Sager. "Advanced Intrusion Prevention for Geographically Dispersed Higher Education Cloud Networks." In Online Engineering & Internet of Things. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64352-6_13.
Full textGu, Chengjie, Shunyi Zhang, and Hanhua Lu. "Online Internet Intrusion Detection Based on Flow Statistical Characteristics." In Knowledge Science, Engineering and Management. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25975-3_15.
Full textRahman, Ahmedur, C. I. Ezeife, and A. K. Aggarwal. "WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System." In Knowledge Discovery from Sensor Data. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12519-5_5.
Full textMu, C. P., X. J. Li, H. K. Huang, and S. F. Tian. "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory." In Computer Security - ESORICS 2008. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_3.
Full textYazdani, Hossein, and Kazimierz Choroś. "Intrusion Detection and Risk Evaluation in Online Transactions Using Partitioning Methods." In Cryptology and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98678-4_21.
Full textZonouz, Saman Aliari, Kaustubh R. Joshi, and William H. Sanders. "FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24270-0_25.
Full textXu, Haitao, Haining Wang, and Angelos Stavrou. "Privacy Risk Assessment on Online Photos." In Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_20.
Full textMahmood, Shah, and Yvo Desmedt. "Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_19.
Full textRen, Hanli, Natalia Stakhanova, and Ali A. Ghorbani. "An Online Adaptive Approach to Alert Correlation." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14215-4_9.
Full textChen, Yizheng, Panagiotis Kintis, Manos Antonakakis, et al. "Financial Lower Bounds of Online Advertising Abuse." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_12.
Full textConference papers on the topic "Online Intrusion"
Villarin, Jan, Xu Chu, and Yi Zou. "METAMORPHIC P-T CONDITION OF A MAFIC META-INTRUSION IN HUNTSVILLE, ONTARIO." In GSA 2020 Connects Online. Geological Society of America, 2020. http://dx.doi.org/10.1130/abs/2020am-356756.
Full textStanic, Sofija, Aaron A. Mohammed, Anner Paldor, Barret Kurylyk, and Holly Michael. "CLIMATE-DRIVEN SALTWATER INTRUSION DYNAMICS IN A CONFINED SMALL-ISLAND AQUIFER IN ATLANTIC CANADA." In GSA 2020 Connects Online. Geological Society of America, 2020. http://dx.doi.org/10.1130/abs/2020am-352038.
Full textKorin, Ashley, Shafiul Chowdhury, and Donald Hodder. "AQUIFER CHARACTERIZATION AND EVALUATION OF SEA WATER INTRUSION USING HYDROGEOCHEMICAL ANALYSES FOR MALEKULA, VANUATU." In GSA 2020 Connects Online. Geological Society of America, 2020. http://dx.doi.org/10.1130/abs/2020am-354185.
Full textWachino, Ian, and Samuel J. Hampton. "EXPLORING THE GEOMETRY AND GEOCHEMISTRY OF THE VOLCANIC INTRUSION UNDERLYING URUMAU RIDGE: LYTTELTON, NEW ZEALAND." In GSA 2020 Connects Online. Geological Society of America, 2020. http://dx.doi.org/10.1130/abs/2020am-356785.
Full textGumus, Fatma, C. Okan Sakar, Zeki Erdem, and Olcay Kursun. "Online Naive Bayes classification for network intrusion detection." In 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2014. http://dx.doi.org/10.1109/asonam.2014.6921657.
Full textNguyen, Hai Thanh, and Katrin Franke. "Adaptive Intrusion Detection System via online machine learning." In 2012 12th International Conference on Hybrid Intelligent Systems (HIS). IEEE, 2012. http://dx.doi.org/10.1109/his.2012.6421346.
Full textConstantinides, Christos, Stavros Shiaeles, Bogdan Ghita, and Nicholas Kolokotronis. "A Novel Online Incremental Learning Intrusion Prevention System." In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2019. http://dx.doi.org/10.1109/ntms.2019.8763842.
Full textCannady, J. "Applying CMAC-based online learning to intrusion detection." In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium. IEEE, 2000. http://dx.doi.org/10.1109/ijcnn.2000.861503.
Full textCastanhel, Gabriel Ruschel, Tiago Heinrich, Fabrício Ceschin, and Carlos A. Maziero. "Sliding Window: The Impact of Trace Size in Anomaly Detection System for Containers Through Machine Learning." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15203.
Full textMilidragovic, Dejan, Graham T. Nixon, Graham T. Nixon, et al. "REDOX CONTROLS ON CU-PGE-AU MINERALIZATION IN THE POLARIS ALASKAN-TYPE INTRUSION, NORTH-CENTRAL BRITISH COLUMBIA." In GSA 2020 Connects Online. Geological Society of America, 2020. http://dx.doi.org/10.1130/abs/2020am-357971.
Full text