Academic literature on the topic 'Outbound intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Outbound intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Outbound intrusion detection"
Salman, Wisam Ali Hussein, and Chan Huah Yong. "Overview of the CICIoT2023 Dataset for Internet of Things Intrusion Detection Systems." Mesopotamian Journal of Big Data 2025 (June 10, 2025): 50–60. https://doi.org/10.58496/mjbd/2025/004.
Full textTerentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textJameel Zaidan, Batool. "Accurate Deep Neural Network Technique Based Network Intrusions Detection System." Journal of Al-Qadisiyah for Computer Science and Mathematics 16, no. 4 (2024). https://doi.org/10.29304/jqcsm.2024.16.41781.
Full textSaraniya. "SECURING THE NETWORK USING SIGNATURE BASED IDS IN NETWORK INTRUSION DETECTION SYSTEMS." June 1, 2019. https://doi.org/10.5281/zenodo.4314317.
Full textSaraniya. "Securing The Network Using Signature Based Ids In Network Intrusion Detection Systems." January 10, 2020. https://doi.org/10.5281/zenodo.4334462.
Full textThirimanne, Sharuka Promodya, Lasitha Jayawardana, Lasith Yasakethu, Pushpika Liyanaarachchi, and Chaminda Hewage. "Deep Neural Network Based Real-Time Intrusion Detection System." SN Computer Science 3, no. 2 (2022). http://dx.doi.org/10.1007/s42979-022-01031-1.
Full textSalvador, Mandujano. "Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID." June 20, 2007. https://doi.org/10.5281/zenodo.1073345.
Full textBook chapters on the topic "Outbound intrusion detection"
Pandu, Vetrivelan, Jagannath Mohan, and T. S. Pradeep Kumar. "Network Intrusion Detection and Prevention Systems for Attacks in IoT Systems." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8241-0.ch006.
Full textConference papers on the topic "Outbound intrusion detection"
Nnaji, David, and Jeremy Daily. "Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2805.
Full text