X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2114) 2114
Conference Proceeding (1657) 1657
Publication (168) 168
Dissertation (167) 167
Book Chapter (148) 148
Book / eBook (77) 77
Government Document (56) 56
Paper (54) 54
Newspaper Article (21) 21
Magazine Article (11) 11
Report (9) 9
Reference (5) 5
Book Review (4) 4
Standard (4) 4
Technical Report (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (2491) 2491
intrusion detection (802) 802
intrusion detection system (697) 697
security (371) 371
intrusion (338) 338
humans (294) 294
network security (237) 237
computer science (226) 226
analysis (223) 223
female (205) 205
intrusion detection systems (202) 202
eindringentdeckung (201) 201
detectors (198) 198
male (196) 196
computer security (195) 195
data mining (193) 193
algorithms (182) 182
computer science, information systems (182) 182
networks (180) 180
computer information security (178) 178
machine learning (174) 174
monitoring (174) 174
index medicus (171) 171
security software (164) 164
anomaly detection (163) 163
telecommunications (163) 163
adult (159) 159
engineering, electrical & electronic (152) 152
psychiatry (150) 150
middle aged (135) 135
symptomatology ids (131) 131
diebstahlsicherung (129) 129
data security (126) 126
internet (125) 125
ips (125) 125
protocols (125) 125
cloud computing (122) 122
classification (110) 110
snort (106) 106
computer networks (105) 105
ad hoc networks (103) 103
maschinelles lernen (102) 102
methods (101) 101
wireless networks (100) 100
feature extraction (98) 98
depression (95) 95
ip networks (95) 95
malware (95) 95
infrastruktur (94) 94
manet (94) 94
training (92) 92
information security (91) 91
neural networks (90) 90
artificial intelligence (89) 89
computer communication networks (88) 88
mobile ad hoc networks (87) 87
netzwerkverkehr (87) 87
servers (87) 87
computer science, artificial intelligence (86) 86
inventory (83) 83
aged (80) 80
engineering (80) 80
feature selection (79) 79
firewall (79) 79
support vector machines (79) 79
wireless sensor networks (79) 79
clustering (77) 77
computers (77) 77
databases (77) 77
research (77) 77
computer science, theory & methods (74) 74
adolescent (71) 71
denial of service attacks (69) 69
routing (69) 69
telecommunication traffic (69) 69
support vector machine (68) 68
computer crime (67) 67
ddos (67) 67
ids gene (67) 67
netzwerkeindringentdeckung (67) 67
conferences (62) 62
sensors (62) 62
dos (61) 61
information technology (60) 60
neuronales netzwerk (60) 60
computer architecture (59) 59
signatur (58) 58
software (58) 58
attacks (57) 57
information systems (57) 57
mathematical models (55) 55
netzwerk-security (55) 55
reliability (55) 55
usage (55) 55
classification algorithms (54) 54
clinical neurology (54) 54
correlation (54) 54
mobile computing (53) 53
artificial neural networks (52) 52
computer science, hardware & architecture (52) 52
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (22) 22
Online Resources - Online (18) 18
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT at Mississauga - Stacks (8) 8
Faculty of Information - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
Gerstein Science - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Robarts - Searching (1) 1
UofT at Scarborough - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3521) 3521
Chinese (225) 225
Japanese (162) 162
French (34) 34
Korean (31) 31
German (18) 18
Spanish (16) 16
Portuguese (10) 10
Turkish (4) 4
Slovak (3) 3
Swedish (3) 3
Dutch (2) 2
Indonesian (2) 2
Catalan (1) 1
Czech (1) 1
Lithuanian (1) 1
Western Frisian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Concurrency Computation, ISSN 1532-0626, 2019, p. e5242
Journal Article
Information Technology Journal, ISSN 1812-5638, 2014, Volume 13, Issue 13, pp. 2065 - 2078
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 06/2018, Volume 31, Issue 9, pp. e3547 - n/a
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 06/2017, Volume 87, pp. 185 - 192
Prior to deploying any intrusion detection system, it is essential to obtain a realistic evaluation of its performance. However, the major problems currently... 
Fuzzy logic | HIDS | IDS dataset | IDS | Dataset evaluation | Dataset realism | NIDS | NETWORK | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | CRITICAL INFRASTRUCTURE PROTECTION | PATTERNS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | Security software | Models | Analysis | Detectors
Journal Article
Computers & Security, ISSN 0167-4048, 03/2018, Volume 73, pp. 411 - 424
The evaluation of algorithms and techniques to implement intrusion detection systems heavily rely on the existence of well designed datasets. In the last... 
Network security | IDS | Netflow | Dataset | Network traffic
Journal Article
2010, 1., Germanistische Bibliothek, ISBN 3825357937, Volume 38
Book
Expert Systems With Applications, ISSN 0957-4174, 12/2017, Volume 88, pp. 249 - 257
Rapid increase in internet and network technologies has led to considerable increase in number of attacks and intrusions. Detection and prevention of these... 
Feature Reduction | ANN | Feature Ranking | Intrusion Detection System (IDS) | FEATURE-SELECTION | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | INFORMATION | ALGORITHM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC | Security software | Rankings | Neural networks | Analysis | Detectors
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 1, pp. 18 - 28
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing... 
Network security | Intrusion detection | Anomaly detection | IDS systems and platforms | Assessment | Threat | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Neurocomputing, ISSN 0925-2312, 09/2015, Volume 164, pp. 71 - 81
The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and... 
IDS | Probabilistic SOM | Bayesian SOM | Self-organizing maps | PCA filtering | FEATURE-SELECTION | ALGORITHM | DETECTION SYSTEM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Security software | Analysis | Detectors | Machine learning
Journal Article
Journal of Chemical and Pharmaceutical Sciences, ISSN 0974-2115, 04/2016, Volume 9, Issue 2, pp. E368 - E373
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 48, Issue C, pp. 338 - 346
An Intrusion Detection System (IDS) is a software application or device that monitors the system or activities of network for policy violations or malicious... 
IDS | Oulier | Anomaly
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 48, Issue C, pp. 503 - 506
The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more aware of the importance of the... 
IDS | OSI | Attacks | Network Security
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 01/2020, Volume 61, p. 101105
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system... 
MQTT | IDS | Replay attacks | ECC | IoT
Journal Article
ARPN Journal of Engineering and Applied Sciences, 07/2018, Volume 13, Issue 14, pp. 4387 - 4392
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 638, pp. 97 - 109
MANET | MNs | IDS | ACO
Conference Proceeding
KSII Transactions on Internet and Information Systems (TIIS), ISSN 1976-7277, 2017, Volume 11, Issue 10, p. 5132
Cyber attacks are evolving commensurate with recent developments in information security technology. Intrusion detection systems collect various types of data... 
IDS | SFFS | FeatureSelection | RandomForest
Journal Article
COMPUTERS & SECURITY, ISSN 0167-4048, 03/2018, Volume 73, pp. 411 - 424
The evaluation of algorithms and techniques to implement intrusion detection systems heavily rely on the existence of well designed datasets. In the last... 
SUPPORT | Dataset | Network traffic | Network security | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDS | Netflow | SYSTEMS | Analysis | Algorithms | Detectors
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11170, pp. 206 - 226
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.