Results 291 to 300 of about 157,047 (316)
Some of the next articles are maybe not open access.
2008
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persistdue to the flaws ofcurrent commercial intrusion detection systems (IDSs).Intrusion Detection Systems is an edited volume ...
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +4 more sources
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persistdue to the flaws ofcurrent commercial intrusion detection systems (IDSs).Intrusion Detection Systems is an edited volume ...
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +4 more sources
Autonomic Intrusion Detection System
2009Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns ability of self-managing: self-labeling, self-updating and self-adapting.
Wang, Wei+2 more
openaire +2 more sources
Intrusion-Detection- und -Prevention-Systeme
2021Enterprise security platforms clearly need the ability to prevent and detect intrusions—which we’ll succinctly define here as unwanted software execution or unwanted human activity on an enterprise device or network. Intrusion Detection Systems (IDS) provide the ability to detect, log, and alert on suspicious activity, and Intrusion Prevention Systems (
Jerry W. Chapman, Jason Garbis
openaire +2 more sources
Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System
2019New information and communication technologies are increasingly dominating our daily lives to the point of becoming indispensable. The computerization of society is now a reality, no sector is aloof from this transformation. This human invention, which has made progress, certainly facilitated the lives of human beings, but at the same time generated ...
Soumiya Ain El Hayat+2 more
openaire +2 more sources
Distributed Intrusion Detection Systems
2006Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource.
Ajith Abraham, Johnson Thomas
openaire +1 more source
Intrusion-Tolerant Intrusion Detection System [PDF]
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire +1 more source
The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +2 more sources
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +2 more sources
Intrusion Detection Systems: A Review
Restaurant Business, 2019Intrusion Detection System is competent to detect the intrusions and alerting the administrator of system about the signs of possible intrusions. This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed.
V. J. K. Kishor Sonti, Ashwini V. Jatti
openaire +2 more sources
Interior Intrusion Detection System [PDF]
Interior Intrusion Detection System (IIDS) is used to monitor the interior areas of radiological laboratories. Passive infra red sensor is used to monitor the intrusion of people. 16 Passive infra red sensors are connected to one controller. Two controllers are connected to server by LAN.
P. Arumugam+2 more
openaire +1 more source
System Intrusion Detection and Prevention
2008The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This
openaire +2 more sources