X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (66) 66
Conference Proceeding (42) 42
Publication (9) 9
Book Chapter (8) 8
Book / eBook (2) 2
Newspaper Article (1) 1
Paper (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
index medicus (14) 14
machine learning (12) 12
analysis (10) 10
wireless networks (10) 10
humans (9) 9
algorithms (7) 7
cryptography (7) 7
data mining (7) 7
proteins (7) 7
research (7) 7
animals (6) 6
immunology (6) 6
studies (6) 6
telecommunication traffic (6) 6
computer networks (5) 5
gene expression (5) 5
gene-expression (5) 5
gri (5) 5
image steganography (5) 5
internet (5) 5
mice (5) 5
research article (5) 5
software (5) 5
stem cells (5) 5
virology (5) 5
wireless communication (5) 5
wireless lan (5) 5
artificial intelligence (4) 4
bandwidth (4) 4
biomedicine (4) 4
cell biology (4) 4
computer science, information systems (4) 4
corporate sustainability report (4) 4
data security (4) 4
dna (4) 4
electronic mail (4) 4
electronic voting (4) 4
engineering (4) 4
feature selection (4) 4
genes (4) 4
genetic aspects (4) 4
genomes (4) 4
health aspects (4) 4
human immunodeficiency virus (4) 4
instrumentierung (4) 4
local area networks (4) 4
methods (4) 4
mikroelektronik (4) 4
multidisciplinary sciences (4) 4
performance analysis (4) 4
unsolicited electronic mail (4) 4
alzheimers-disease (3) 3
analytical models (3) 3
authentication (3) 3
bayesian methods (3) 3
biochemical research methods (3) 3
biochemistry & molecular biology (3) 3
bioinformatics (3) 3
biotechnology & applied microbiology (3) 3
cancer (3) 3
computer architecture (3) 3
computer science - networking and internet architecture (3) 3
computer security (3) 3
detectors (3) 3
dna methylation (3) 3
engineering, electrical & electronic (3) 3
feature extraction (3) 3
filtering (3) 3
fuzzy logic (3) 3
genetics & heredity (3) 3
hiv (3) 3
image edge detection (3) 3
immune response (3) 3
infectious diseases (3) 3
intrusion (3) 3
intrusion detection system (3) 3
medical research (3) 3
medicine (3) 3
network security (3) 3
network servers (3) 3
neuron (3) 3
neurosciences (3) 3
noise (3) 3
oncology (3) 3
physiological aspects (3) 3
quality of service (3) 3
science (3) 3
security threats (3) 3
steganography (3) 3
supervised learning (3) 3
systems biology (3) 3
telecommunications (3) 3
traffic control (3) 3
training (3) 3
visual cryptography (3) 3
acceptance (2) 2
accuracy (2) 2
acquired immune deficiency syndrome (2) 2
acquired immune deficiency syndrome--aids (2) 2
activation (2) 2
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


01/2014, ISBN 9781482207064
Book
Future Generation Computer Systems, ISSN 0167-739X, 03/2018, Volume 80, pp. 157 - 170
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious... 
Performance comparison | Support Vector Machine | Snort and Suricata | Fuzzy Logic | Intrusion detection | Machine learning | EVAPOTRANSPIRATION | COMPUTER SCIENCE, THEORY & METHODS | Security software | Algorithms | Comparative analysis | Data mining | Detectors
Journal Article
Cancer Research, ISSN 0008-5472, 11/2015, Volume 75, Issue 22 Supplement 2, pp. B1 - B1-04
Journal Article
International Journal of Computational Intelligence and Applications, ISSN 1469-0268, 06/2019, Volume 18, Issue 2
Twitter has changed the way people get information by allowing them to express their opinion and comments on the daily tweets. Unfortunately, due to the high... 
Social networks | Drift | Machine learning
Journal Article
International Journal of Business Data Communications and Networking, ISSN 1548-0631, 01/2016, Volume 12, Issue 1, pp. 36 - 62
IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4 to... 
Tunnelling | Security attacks | Simulation | Efficiency | IPv6 | Transition schemes | Dual Stack | Performance analysis | Transportation networks | Manuals | Stacks | IP (Internet Protocol) | Security | Design analysis | Translations | Business
Journal Article
International Journal of Business Data Communications and Networking, ISSN 1548-0631, 01/2016, Volume 12, Issue 1, p. 36
  IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4... 
Studies | Simulation | Wireless networks | Network security | Internet Protocol
Journal Article
Lecture Notes in Electrical Engineering, ISSN 1876-1100, 2015, Volume 313, pp. 241 - 246
Journal Article
International Journal of Network Security, ISSN 1816-353X, 2009, Volume 8, Issue 2, pp. 107 - 118
Journal Article
International Journal of Computational Intelligence Systems, ISSN 1875-6891, 09/2015, Volume 8, Issue 5, pp. 841 - 853
In this paper we discuss and analyze some of the intelligent classifiers which allows for automatic detection and classification of networks attacks for any... 
Intrusion Detection | Detection accuracy | Data Mining | Machine Learning | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Journal Article
Wireless Communications and Mobile Computing, ISSN 1530-8669, 2017, Volume 2017, pp. 1 - 23
A Wireless Sensor Network (WSN) is a network of many nodes. These nodes are equipped with sensors which communicate wirelessly using techniques for radio... 
COMPUTER SCIENCE, INFORMATION SYSTEMS | COLLISION | ENERGY-EFFICIENT | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Data communications | Wireless sensor networks | Research | Computer network protocols | Methods
Journal Article
Human Immunology, ISSN 0198-8859, 09/2017, Volume 78, pp. 22 - 22
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1016/j.humimm.2017.06.028... 
RNA sequencing | Single nucleotide polymorphisms | RNA | Chromosomes | Histocompatibility antigens | Analysis | Genes | DNA | HLA histocompatibility antigens | Nucleotide sequencing | DNA sequencing
Journal Article
International Journal of Grid and Utility Computing, ISSN 1741-847X, 2018, Volume 9, Issue 1, pp. 1 - 17
In order to enhance resource utilisation and power efficiency in cloud data centres it is important to perform Virtual Machine (VM) placement in an optimal... 
Cloud computing | Meta-heuristic algorithms | Virtual machine placement | Enhanced cuckoo search algorithm | Data centers | Energy consumption | Ant colony optimization | Algorithms | Search algorithms | Placement | Heuristic methods | Virtual environments | Fireflies | Power efficiency | Genetic algorithms
Journal Article
Journal of Intelligent and Fuzzy Systems, ISSN 1064-1246, 2018, Volume 35, Issue 3, pp. 3635 - 3651
Machine Learning is successful in many applications including securing a network from unseen attack. The application of learning algorithm for detecting... 
NSL-KDD dataset | intrusion detection system | poison learning | SVM | Adversarial learning | machine learning | artificial intelligence | support vectors | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Intrusion | Algorithms | Distance learning | Classification | Machine learning | Remote observing | Artificial intelligence | Computer security
Journal Article
Journal Article
International Journal of Computational Intelligence and Applications, ISSN 1469-0268, 06/2018, Volume 17, Issue 2
In this paper, an existing rule-based intrusion detection system (IDS) is made more intelligent through the application of machine learning. Snort was chosen... 
Snort intrusion detection | firefly | support vector machine | machine learning | ACO | fuzzy logic | Intrusion | Ant colony optimization | Open source software | Support vector machines | Fuzzy logic | Freeware | Algorithms | Machine learning | Fireflies | Decision trees | Artificial intelligence | Computer security | Intrusion detection systems
Journal Article
12/2014
Journal of Computer Networks and Communications (IJCNC), 6(6), 63-78 2014 Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that... 
Computer Science - Networking and Internet Architecture
Journal Article
Journal of Computing and Information Technology, ISSN 1330-1136, 2017, Volume 25, Issue 1, pp. 47 - 61
ACM CCS (2012) Classification: Security and privacy [right arrow] Security services [right arrow] Authentication [right arrow] Graphical / visual passwords 
Electronic voting system | Visual cryptography | Image steganography | User acceptance testing | Internet voting | Steganography | Data security | Cryptography | Methods | usability testing | online voting system | image steganography | visual cryptography
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.