Results 281 to 290 of about 166,319 (306)

Network Intrusion Detection System

open access: yesInternational Research Journal of Modernization in Engineering Technology & Science
openaire   +1 more source

Intrusion-Tolerant Intrusion Detection System

2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire   +1 more source

Intrusion Detection System

2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire   +1 more source

Intrusion detection system

The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire   +1 more source

Intrusion Detection Systems

2021
The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware.
Riya Bilaiya   +2 more
openaire   +1 more source

Intrusion Detection Systems

2005
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik   +2 more
openaire   +1 more source

Intrusion-Detection- und -Prevention-Systeme

2021
Enterprise security platforms clearly need the ability to prevent and detect intrusions—which we’ll succinctly define here as unwanted software execution or unwanted human activity on an enterprise device or network. Intrusion Detection Systems (IDS) provide the ability to detect, log, and alert on suspicious activity, and Intrusion Prevention Systems (
Jason Garbis, Jerry W. Chapman
openaire   +1 more source

Intrusion Detection Systems

Applied Mechanics and Materials, 2014
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire   +2 more sources

Home - About - Disclaimer - Privacy