Results 321 to 330 of about 1,142,874 (336)
Some of the next articles are maybe not open access.

Intrusion Detection System

2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire   +1 more source

A survey of VoIP intrusions and intrusion detection systems

The 6th International Conference on Advanced Communication Technology, 2004., 2004
This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire   +2 more sources

Intrusion and ransomware detection system

2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018
Attackers and cybercriminals are always in a race to either compromise networks and servers or embezzle ransoms through ransomware. Intruders must be prevented from such exploitations of assets, and their malicious attempts counterattacked. Among of the easiest ways of preventing intruders from compromising servers and networks is the use of ...
Marianne A. Azer, Ahmed El-Kosairy
openaire   +2 more sources

High-performance intrusion detection system for networked UAVs via deep learning

Neural computing & applications (Print), 2022
Q. Abu Al-haija, A. Al Badawi
semanticscholar   +1 more source

ULISSE, a network intrusion detection system

Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, 2008
In this paper we present a tool for network anomaly detection and network intelligence which we named ULISSE. It uses a two tier architecture with unsupervised learning algorithms to perform network intrusion and anomaly detection. ULISSE uses a combination of clustering of packet payloads and correlation of anomalies in the packet stream.
openaire   +4 more sources

Intrusion Detection Systems

2019
David J Brooks, Michael Coole
openaire   +2 more sources

Research of Intrusion Detection System

2013 International Conference on Computational and Information Sciences, 2013
Intrusion detection technology is one of the core technologies of dynamic security defense. It and static security technologies can form a strong network security system. Firstly, this article introduces the development of intrusion detection system. Secondly, this paper introduces the new technologies of intrusion detection system.
openaire   +2 more sources

Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks

Journal of Ambient Intelligence and Humanized Computing, 2020
Mukaram Safaldin, M. Otair, L. Abualigah
semanticscholar   +1 more source

Intrusion Detection Systems and Intrusion Prevention Systems

Information Security Technical Report, 2005
openaire   +1 more source

Home - About - Disclaimer - Privacy