Results 271 to 280 of about 208,052 (306)
Some of the next articles are maybe not open access.
Proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen +3 more
+4 more sources
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen +3 more
+4 more sources
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
Overview of intrusion detection and intrusion prevention
Proceedings of the 5th annual conference on Information security curriculum development, 2008This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Mario Guimaraes, Meg Murray
openaire +1 more source
On collaborative intrusion detection
2016Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire +1 more source
Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
TENCON 2005 - 2005 IEEE Region 10 Conference, 2005While wireless networks are growing in popularity, monitoring these networks for abuse and intrusions is almost nonexistent. Although some intrusion prevention systems have recently appeared on the market, their intrusion detection capabilities are limited. Real intrusion detection in wireless networks is not a simple add on.
Zhiqi Tao, A. Ruighaver
openaire +1 more source

