Journal articles on the topic 'Signature-based intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Signature-based intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
V. Stetsenko, Inna, and Maksym Demydenko. "Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221–31. http://dx.doi.org/10.11610/isij.4715.
Full textPanagiotou, Panos, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods." Information & Security: An International Journal 50 (2021): 37–48. http://dx.doi.org/10.11610/isij.5016.
Full textEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems." Mathematical Problems in Engineering 2021 (March 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/6639714.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textKala, T. Sree, and A. Christy. "Signature Based Algorithms and Intrusion Detection Systems." International Journal of Web Technology 5, no. 1 (June 13, 2016): 9–12. http://dx.doi.org/10.20894/ijwt.104.005.001.003.
Full textAnand, Saloni, and Kshitij Patne. "Network Intrusion Detection and Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3754–59. http://dx.doi.org/10.22214/ijraset.2022.44761.
Full textSharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (September 29, 2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.
Full textKwon, Hee-Yong, Taesic Kim, and Mun-Kyu Lee. "Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods." Electronics 11, no. 6 (March 9, 2022): 867. http://dx.doi.org/10.3390/electronics11060867.
Full textRoka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.
Full textAntunes, Mário, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado, and Tiago Murteira. "Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection." Informatics 9, no. 1 (March 20, 2022): 29. http://dx.doi.org/10.3390/informatics9010029.
Full textAyachi, Yassine, Youssef Mellah, Mohammed Saber, Noureddine Rahmoun, Imane Kerrakchou, and Toumi Bouchentouf. "A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 4 (December 1, 2022): 1607. http://dx.doi.org/10.11591/ijai.v11.i4.pp1607-1614.
Full textKim, Jiyeon, and Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks." Electronics 9, no. 3 (March 9, 2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textPark, Sang-No, A.-Yong Kim, and Hoe-Kyung Jung. "A Study on Signature-based Wireless Intrusion Detection Systems." Journal of the Korea Institute of Information and Communication Engineering 18, no. 5 (May 31, 2014): 1122–27. http://dx.doi.org/10.6109/jkiice.2014.18.5.1122.
Full textAlviana, Sopian, and Irfan Dwiguna Sumitra. "ANALISIS PENGUKURAN PENGGUNAAN SUMBER DAYA KOMPUTER PADA INTRUSION DETECTION SYSTEM DALAM MEMINIMALKAN SERANGAN JARINGAN." Komputa : Jurnal Ilmiah Komputer dan Informatika 7, no. 1 (March 19, 2018): 27–34. http://dx.doi.org/10.34010/komputa.v7i1.2533.
Full textMohammadi, Shahriar, and Fatemeh Amiri. "An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks." International Journal of Computational Intelligence and Applications 18, no. 01 (March 2019): 1950001. http://dx.doi.org/10.1142/s1469026819500019.
Full textKalinin, Maxim, Dmitry Zegzhda, Vasiliy Krundyshev, Daria Lavrova, Dmitry Moskvin, and Evgeny Pavlenko. "Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection." Informatics and Automation 20, no. 4 (August 3, 2021): 820–44. http://dx.doi.org/10.15622/ia.20.4.3.
Full textPietro Spadaccino and Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing." ITU Journal on Future and Evolving Technologies 3, no. 2 (September 22, 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Full textKhraisat, Gondal, Vamplew, Kamruzzaman, and Alazab. "A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks." Electronics 8, no. 11 (October 23, 2019): 1210. http://dx.doi.org/10.3390/electronics8111210.
Full textArip Winanto, Eko, Mohd Yazid Idris, Deris Stiawan, and Mohammad Sulkhan Nurfatih. "Designing consensus algorithm for collaborative signature-based intrusion detection system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 485. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp485-496.
Full textShafi, Kamran, and Hussein A. Abbass. "An adaptive genetic-based signature learning system for intrusion detection." Expert Systems with Applications 36, no. 10 (December 2009): 12036–43. http://dx.doi.org/10.1016/j.eswa.2009.03.036.
Full textLi, Wenjuan, Steven Tug, Weizhi Meng, and Yu Wang. "Designing collaborative blockchained signature-based intrusion detection in IoT environments." Future Generation Computer Systems 96 (July 2019): 481–89. http://dx.doi.org/10.1016/j.future.2019.02.064.
Full textAlhadithy, Alaa Khalil, and Awezan Aso Omar. "Online Database Intrusion Detection System Based on Query Signatures." Journal of University of Human Development 3, no. 1 (March 31, 2017): 282. http://dx.doi.org/10.21928/juhd.v3n1y2017.pp282-287.
Full textWang, Yu, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, and Yang Xiang. "A fog-based privacy-preserving approach for distributed signature-based intrusion detection." Journal of Parallel and Distributed Computing 122 (December 2018): 26–35. http://dx.doi.org/10.1016/j.jpdc.2018.07.013.
Full textGaur, Riddhi, and Uma Kumari. "Hybrid Intrusion Detection System for Private Cloud & Public Cloud." Oriental journal of computer science and technology 10, no. 2 (May 15, 2017): 438–45. http://dx.doi.org/10.13005/ojcst/10.02.26.
Full textJavidi, Mohammad Masoud. "Network Attacks Detection by Hierarchical Neural Network." Computer Engineering and Applications Journal 4, no. 2 (June 18, 2015): 119–32. http://dx.doi.org/10.18495/comengapp.v4i2.108.
Full textAlYousef, Mutep Y., and Nabih T. Abdelmajeed. "Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System’s Database." Procedia Computer Science 159 (2019): 1507–16. http://dx.doi.org/10.1016/j.procs.2019.09.321.
Full textCepheli, Özge, Saliha Büyükçorak, and Güneş Karabulut Kurt. "Hybrid Intrusion Detection System for DDoS Attacks." Journal of Electrical and Computer Engineering 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/1075648.
Full textUddin, Mueen, Kamran Khowaja, and Azizah Abdul Rehman. "Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents." International Journal of Network Security & Its Applications 2, no. 4 (October 22, 2010): 129–41. http://dx.doi.org/10.5121/ijnsa.2010.2411.
Full textGascon, Hugo, Agustin Orfila, and Jorge Blasco. "Analysis of update delays in signature-based network intrusion detection systems." Computers & Security 30, no. 8 (November 2011): 613–24. http://dx.doi.org/10.1016/j.cose.2011.08.010.
Full textHan, Hong, Xian Liang Lu, Jun Lu, Chen Bo, and Ren Li Yong. "Data mining aided signature discovery in network-based intrusion detection system." ACM SIGOPS Operating Systems Review 36, no. 4 (October 2002): 7–13. http://dx.doi.org/10.1145/583800.583801.
Full textAbbas, Umar Farouk, and Abdulrahman Abdulkarim. "PERFORMANCE ANALYSIS OF CAPTCHA BASED BLOCKING AND RESPONSE OF AN INTRUSION DETECTION MODEL USING SIGNATURE." FUDMA JOURNAL OF SCIENCES 6, no. 3 (July 6, 2022): 248–53. http://dx.doi.org/10.33003/fjs-2022-0603-998.
Full textPrakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (November 27, 2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textIliyasu, Auwal Sani. "A Survey of Network Intrusion Detection Techniques Using Deep Learning." International Journal of Engineering Research in Computer Science and Engineering 9, no. 8 (August 6, 2022): 93–97. http://dx.doi.org/10.36647/ijercse/09.08.art017.
Full textAbdulameer, Hasan, Inam Musa, and Noora Salim Al-Sultani. "Three level intrusion detection system based on conditional generative adversarial network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 2240. http://dx.doi.org/10.11591/ijece.v13i2.pp2240-2258.
Full textPao, Derek, Nga Lam Or, and Ray C. C. Cheung. "A memory-based NFA regular expression match engine for signature-based intrusion detection." Computer Communications 36, no. 10-11 (June 2013): 1255–67. http://dx.doi.org/10.1016/j.comcom.2013.03.002.
Full textOuarda, Lounis, Bourenane Malika, Nacer Eddine Yousfi, and Bouderah Brahim. "Improving the efficiency of intrusion detection in information systems." Journal of Intelligent Systems 31, no. 1 (January 1, 2022): 835–54. http://dx.doi.org/10.1515/jisys-2022-0059.
Full textUsman, Saifudin, Idris Winarno, and Amang Sudarsono. "SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment." EMITTER International Journal of Engineering Technology 9, no. 2 (December 30, 2021): 252–67. http://dx.doi.org/10.24003/emitter.v9i2.616.
Full textModi, Chirag N., Dhiren R. Patel, Avi Patel, and Muttukrishnan Rajarajan. "Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing." Procedia Technology 6 (2012): 905–12. http://dx.doi.org/10.1016/j.protcy.2012.10.110.
Full textMasdari, Mohammad, and Hemn Khezri. "A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems." Applied Soft Computing 92 (July 2020): 106301. http://dx.doi.org/10.1016/j.asoc.2020.106301.
Full textHubballi, Neminath, and Vinoth Suryanarayanan. "False alarm minimization techniques in signature-based intrusion detection systems: A survey." Computer Communications 49 (August 2014): 1–17. http://dx.doi.org/10.1016/j.comcom.2014.04.012.
Full textAthavale, Nachiket, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, and S. S. Barde. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols." International Journal of Synthetic Emotions 8, no. 2 (July 2017): 62–75. http://dx.doi.org/10.4018/ijse.2017070105.
Full textAlmuhairi, Thani, Ahmad Almarri, and Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System." Journal of Cybersecurity and Information Management 07, no. 02 (April 1, 2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Full textLatha, S., and Sinthu Janita Prakash. "A Signature Based Intrusion Detection System with HPFSM and Fuzzy Based Classification Method (IDSFSC)." Asian Journal of Engineering and Applied Technology 8, no. 2 (May 5, 2019): 23–29. http://dx.doi.org/10.51983/ajeat-2019.8.2.1144.
Full textAlzahrani, Mohammed Saeed, and Fawaz Waselallah Alsaade. "Computational Intelligence Approaches in Developing Cyberattack Detection System." Computational Intelligence and Neuroscience 2022 (March 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/4705325.
Full textNajafian, Ziaeddin, Vahe Aghazarian, and Alireza Hedayati. "Signature-Based Method and Stream Data Mining Technique Performance Evaluation for Security and Intrusion Detection in Advanced Metering Infrastructures (AMI)." International Journal of Computer and Electrical Engineering 7, no. 2 (2015): 128–39. http://dx.doi.org/10.17706/ijcee.2015.v7.879.
Full textNIKULIN, VLADIMIR. "WEIGHTED THRESHOLD-BASED CLUSTERING FOR INTRUSION DETECTION SYSTEMS." International Journal of Computational Intelligence and Applications 06, no. 01 (March 2006): 1–19. http://dx.doi.org/10.1142/s1469026806001770.
Full textRadivilova, Tamara, Lyudmyla Kirichenko, Maksym Tawalbeh, Petro Zinchenko, and Vitalii Bulakh. "THE LOAD BALANCING OF SELF-SIMILAR TRAFFIC IN NETWORK INTRUSION DETECTION SYSTEMS." Cybersecurity: Education, Science, Technique 3, no. 7 (2020): 17–30. http://dx.doi.org/10.28925/2663-4023.2020.7.1730.
Full textLeonardi, Mauro, and Fabrizio Gerardi. "Aircraft Mode S Transponder Fingerprinting for Intrusion Detection." Aerospace 7, no. 3 (March 18, 2020): 30. http://dx.doi.org/10.3390/aerospace7030030.
Full text