-
1
New approach to evaluate the capacity of signature-based intrusion detection systems
Published 2007-01-01Subjects: “…intrusion detection;signature-based intrusion detection system;evaluation…”
Get full text
Article -
2
New approach to evaluate the capacity of signature-based intrusion detection systems
Published 2007-01-01Subjects: “…intrusion detection…”
Get full text
Article -
3
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
Published 2021-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
4
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01Subjects: “…Intrusion detection…”
Get full text
Article -
5
Intrusion Detection Systems for Intra-Vehicle Networks: A Review
Published 2019-01-01Subjects: Get full text
Article -
6
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01Subjects: “…Intrusion detection in IoT…”
Get full text
Article -
7
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach With Curated Dataset Generation for Enhanced Security
Published 2023-01-01Subjects: “…Intrusion detection…”
Get full text
Article -
8
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System
Published 2013-03-01Subjects: “…intrusion detection…”
Get full text
Article -
9
Comprehensive Performance Evaluation Of Network Intrusion System Using Machine Learning Approach
Published 2019-07-01Subjects: “…Network Intrusion Detection System…”
Get full text
Article -
10
Intrusion Detection Systems Retraining
Published 2010-03-01Subjects: “…intrusion detection…”
Get full text
Article -
11
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
Published 2025-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
12
METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS
Published 2015-04-01Subjects: Get full text
Article -
13
A Systematic Review of Intrusion Detection using Hidden Markov Models: Approaches, Applications, and Challenges
Published 2018-06-01Subjects: Get full text
Article -
14
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks /
Published 2008Subjects: “…Intrusion detection systems (Computer security)…”
-
15
The development of attack response mechanism for intrusion detection system /
Published 2006Subjects: “…Intrusion detection systems (Computer security)…”
text -
16
Packet-level intrusion detection /
Published 2009Subjects: “…Intrusion detection systems (Computer security)…”
-
17
Packet-level intrusion detection [electronic resource] /
Published 2009Subjects: “…Intrusion detection systems (Computer security)…”
-
18
Intrusion detection system GA seeded K-Means approach /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
19
Intrusion detection system GA seeded K-Means approach [electronic resource] /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
20
Intrusion detection system PSO seeded k-means approach /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”