Results 311 to 320 of about 1,142,874 (336)
Some of the next articles are maybe not open access.

Intrusion detection system

The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire   +2 more sources

Intrusion Detection Systems: A Review

Restaurant Business, 2019
Intrusion Detection System is competent to detect the intrusions and alerting the administrator of system about the signs of possible intrusions. This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed.
V. J. K. Kishor Sonti, Ashwini V. Jatti
openaire   +2 more sources

Interior Intrusion Detection System [PDF]

open access: possible2019 International Carnahan Conference on Security Technology (ICCST), 2019
Interior Intrusion Detection System (IIDS) is used to monitor the interior areas of radiological laboratories. Passive infra red sensor is used to monitor the intrusion of people. 16 Passive infra red sensors are connected to one controller. Two controllers are connected to server by LAN.
P. Arumugam   +2 more
openaire   +1 more source

System Intrusion Detection and Prevention

2008
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This
openaire   +2 more sources

Intrusion Detection Systems

Applied Mechanics and Materials, 2014
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire   +2 more sources

Intrusion Detection System for Cloud Environment

Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Cloud computing environment is threatened by different types of cyber-attacks. This paper presents an implementation of intrusion detection system to secure virtualized servers on the cloud platform and validates intrusion detection system in detecting DDoS attack against the virtualized environment.
Hifaa Bait Baraka, Huaglory Tianfield
openaire   +3 more sources

A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs

2014 International Conference on Computational Intelligence and Communication Networks, 2014
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
Suresh Veluru   +1 more
openaire   +2 more sources

Understanding Intrusion Detection Systems

EDPACS, 2001
Abstract I ntrusion detection is the process of detecting an unauthorized use of, or attack upon, a computer or a telecommunication network. Intrusion detection systems (IDSs)are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems.
openaire   +2 more sources

Intrusion Prevention and Detection Systems

2009
With the increasing importance of information systems in today’s complex and global economy, it has become mission and business critical to defend those information systems from attack and compromise by any number of adversaries. Intrusion prevention and detection systems are critical components in the defender’s arsenal and take on a number of ...
openaire   +3 more sources

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems

2008 Third International Conference on Availability, Reliability and Security, 2008
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Mohammad Zulkernine, Liwei Kuang
openaire   +2 more sources

Home - About - Disclaimer - Privacy