-
1
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
Published 2021-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
2
Comprehensive Performance Evaluation Of Network Intrusion System Using Machine Learning Approach
Published 2019-07-01Subjects: “…Network Intrusion Detection System…”
Get full text
Article -
3
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
Published 2025-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
4
From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding
Published 2024-01-01Subjects: Get full text
Article -
5
INTRUSION DETECTION SYSTEMS IN A HETEROGENOUS NETWORK ENVIRONMENT
Published 2020-01-01Subjects: Get full text
Article -
6
A Combined Approach Of Adasyn And Tomeklink For Anomaly Network Intrusion Detection System Using Some Selected Machine Learning Algorithms
Published 2024-09-01Subjects: “…network intrusion detection system…”
Get full text
Article -
7
A Systematic Literature Review on Host-Based Intrusion Detection Systems
Published 2024-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
8
Hybrid Feature Selection Approach to Improve the Deep Neural Network on New Flow-Based Dataset for NIDS
Published 2021-03-01Subjects: “…Network Intrusion Detection System…”
Get full text
Article -
9
Analysis of Approaches to Detecting Attacks in Encrypted Traffic
Published 2021-12-01Subjects: “…intrusion detection system…”
Get full text
Article -
10
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors
Published 2018-03-01Subjects: “…intrusion detection system…”
Get full text
Article -
11
Securing Infrastructure-as-a-Service Public Clouds Using Security Onion
Published 2019-01-01Subjects: Get full text
Article -
12
DETEKSI PENYUSUPAN PADA SERVER MENGGUNAKAN METODE INTRUSION DETECTION SYSTEM (IDS) BERBASIS SNORT
Published 2020-03-01Subjects: “…intrusion detection system (ids)…”
Get full text
Article -
13
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
Published 2019-11-01Subjects: Get full text
Article -
14
Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems
Published 2021-04-01Subjects: Get full text
Article -
15
INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR
Published 2021-12-01Subjects: Get full text
Article -
16
A Proposal to Detect Computer Worms (Malicious Codes) Using Data Mining Classification Algorithms
Published 2013-02-01Subjects: Get full text
Article -
17
A Cloud Based Network Intrusion Detection System
Published 2022-01-01Subjects: Get full text
Article -
18
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Published 2013-03-01Subjects: Get full text
Article -
19
ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS
Published 2023-12-01Subjects: “…intrusion detection system…”
Get full text
Article -
20
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01Subjects: “…security in the system, intrusion detection system, traffic analysis.…”
Get full text
Article