Results 231 to 240 of about 150,878 (273)
Network Intrusion Detection System
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Intrusion-Tolerant Intrusion Detection System
2004Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire +1 more source
2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +1 more source
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +1 more source
2021
The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware.
Riya Bilaiya +2 more
openaire +1 more source
The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware.
Riya Bilaiya +2 more
openaire +1 more source
2005
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik +2 more
openaire +1 more source
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik +2 more
openaire +1 more source
Intrusion-Detection- und -Prevention-Systeme
2021Enterprise security platforms clearly need the ability to prevent and detect intrusions—which we’ll succinctly define here as unwanted software execution or unwanted human activity on an enterprise device or network. Intrusion Detection Systems (IDS) provide the ability to detect, log, and alert on suspicious activity, and Intrusion Prevention Systems (
Jason Garbis, Jerry W. Chapman
openaire +1 more source
Applied Mechanics and Materials, 2014
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire +2 more sources
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire +2 more sources
2007
This chapter provides an overview of the state of the art in intrusion detection systems. Intrusion detection systems are software/hardware components that monitor systems and analyze the events for intrusions. This chapter first provides a taxonomy of intrusion detection systems.
+4 more sources
This chapter provides an overview of the state of the art in intrusion detection systems. Intrusion detection systems are software/hardware components that monitor systems and analyze the events for intrusions. This chapter first provides a taxonomy of intrusion detection systems.
+4 more sources
2022
Οι συσκευές που διαθέτουν ασύρματη σύνδεση στο Διαδίκτυο γίνονται διαδεδομένες. Κάθε μέρα, ο ρυθμός ανάπτυξης επιταχύνεται εκθετικά. Μέχρι το 2030, αναμένεται ότι κάθε άτομο θα έχει συνολικά 15 gadget συνδεδεμένα στο Διαδίκτυο. Ως αποτέλεσμα, μεταβαίνουμε σταδιακά από το Διαδίκτυο των Πραγμάτων στο Διαδίκτυο των Πάντων.
openaire +1 more source
Οι συσκευές που διαθέτουν ασύρματη σύνδεση στο Διαδίκτυο γίνονται διαδεδομένες. Κάθε μέρα, ο ρυθμός ανάπτυξης επιταχύνεται εκθετικά. Μέχρι το 2030, αναμένεται ότι κάθε άτομο θα έχει συνολικά 15 gadget συνδεδεμένα στο Διαδίκτυο. Ως αποτέλεσμα, μεταβαίνουμε σταδιακά από το Διαδίκτυο των Πραγμάτων στο Διαδίκτυο των Πάντων.
openaire +1 more source

