X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (400) 400
Conference Proceeding (323) 323
Dissertation (41) 41
Publication (33) 33
Book Chapter (29) 29
Book / eBook (7) 7
Paper (7) 7
Standard (4) 4
Government Document (3) 3
Technical Report (3) 3
Book Review (1) 1
Magazine Article (1) 1
Newspaper Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (543) 543
intrusion detection system (182) 182
intrusion detection (171) 171
intrusion (148) 148
security (119) 119
telecommunications (97) 97
computer security (94) 94
detectors (93) 93
computer science, information systems (83) 83
engineering, electrical & electronic (82) 82
intrusion detection systems (82) 82
security software (82) 82
computer science (81) 81
analysis (74) 74
network security (68) 68
eindringentdeckung (67) 67
algorithms (65) 65
computer information security (61) 61
computer architecture (59) 59
networks (56) 56
wireless networks (55) 55
data security (54) 54
computer science, hardware & architecture (52) 52
cloud computing (51) 51
machine learning (50) 50
computer communication networks (48) 48
engineering (48) 48
anomaly detection (47) 47
monitoring (45) 45
computer science, theory & methods (43) 43
infrastruktur (43) 43
internet (41) 41
methods (40) 40
data mining (39) 39
denial of service attacks (39) 39
ad hoc networks (37) 37
neural networks (37) 37
diebstahlsicherung (36) 36
maschinelles lernen (36) 36
communications engineering, networks (35) 35
wireless sensor networks (34) 34
protocols (33) 33
artificial intelligence (32) 32
classification (30) 30
malware (30) 30
netzwerkverkehr (29) 29
computer networks (28) 28
sensors (26) 26
usage (26) 26
computer science, artificial intelligence (25) 25
architecture (24) 24
computer science, interdisciplinary applications (24) 24
manet (24) 24
research (24) 24
drahtloses sensornetzwerk (23) 23
information security (23) 23
internet of things (23) 23
netzwerk-security (23) 23
netzwerkeindringentdeckung (23) 23
nachweiseinrichtung (22) 22
servers (22) 22
attacks (21) 21
ddos (21) 21
detektorsystem (21) 21
ips (21) 21
neuronales netzwerk (21) 21
security management (21) 21
computer science, software engineering (20) 20
computer simulation (20) 20
dos (20) 20
internet der dinge (20) 20
netzwerksicherheit (20) 20
safety and security measures (20) 20
snort (20) 20
clustering (19) 19
electrical engineering (19) 19
remote sensors (19) 19
signatur (19) 19
mobile communication systems (18) 18
protection (18) 18
sicherheitsbedrohung (18) 18
algorithm (17) 17
artificial neural networks (17) 17
computer crime (17) 17
computer-netzwerk (17) 17
feature extraction (17) 17
sdn (17) 17
communications traffic (16) 16
firewall (16) 16
protocol (16) 16
signal,image and speech processing (16) 16
入侵偵測系統 (16) 16
anomalies (15) 15
cloud-computing (15) 15
data encryption (15) 15
deep learning (15) 15
mathematical models (15) 15
processor architectures (15) 15
server (15) 15
simuliertes ergebnis (15) 15
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (729) 729
Japanese (12) 12
Korean (6) 6
Chinese (5) 5
French (4) 4
Portuguese (3) 3
Spanish (2) 2
Turkish (2) 2
Czech (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computers & Security, ISSN 0167-4048, 06/2018, Volume 75, pp. 36 - 58
Journal Article
Computers & Security, ISSN 0167-4048, 05/2016, Volume 58, pp. 1 - 19
•We detect DDoS, worm spreading and scanning in different network sizes.•CIPA performs well in both simulated networks and real-world SDN environment.•The... 
Collaborative intrusion detection system (CIDS) | Large-scale distributed attacks | Software-defined networks (SDN) | Programmable network | Collaborative intrusion prevention | COMPUTER SCIENCE, INFORMATION SYSTEMS | Architecture | Security software
Journal Article
International Journal of Innovative Computing, Information and Control, ISSN 1349-4198, 2013, Volume 9, Issue 1, pp. 231 - 255
There are many different approaches to alert correlation such as using correlation rules and prerequisite-consequences, using machine learning and statistical... 
Artificial immune system (AIS) | Intrusion detection system (IDS) | Alert correlation | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Journal Article
Computers & Security, ISSN 0167-4048, 2008, Volume 27, Issue 1, pp. 30 - 47
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 04/2018, Volume 108, pp. 76 - 86
Journal Article
Journal of Engineering and Applied Sciences, ISSN 1816-949X, 2019, Volume 14, Issue 2, pp. 415 - 422
Journal Article
Wireless Personal Communications, ISSN 0929-6212, 09/2016, Volume 90, Issue 2, pp. 847 - 859
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to... 
Wireless sensor network | Hello flood | Selective forwarding | Security | Intrusion detection system | DoS attack | TELECOMMUNICATIONS | Wireless sensor networks | Denial of service attacks | Safety and security measures | Analysis | Remote sensors | Networks | Wireless networks | Disk operating system (DOS) | Data transmission | Computer information security
Journal Article
International Journal of Network Security, ISSN 1816-353X, 03/2014, Volume 16, Issue 2, pp. 81 - 89
Journal Article
Journal of Computer Science, ISSN 1549-3636, 2014, Volume 10, Issue 6, pp. 970 - 975
Journal Article
International Journal of Innovative Technology and Exploring Engineering, 2019, Volume 8, Issue 5, pp. 389 - 393
Journal Article
Conference Proceeding
Lecture Notes in Electrical Engineering, ISSN 1876-1100, 2017, Volume 397, pp. 259 - 271
Conference Proceeding
Lecture Notes in Electrical Engineering, ISSN 1876-1100, 2016, Volume 381, pp. 479 - 487
Conference Proceeding
Computers & Security, ISSN 0167-4048, 2011, Volume 30, Issue 1, pp. 63 - 80
Journal Article
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), ISSN 0743-166X, 04/2016, Volume 2016-, pp. 334 - 339
Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The... 
Cloud computing | Firewalls (computing) | Intrusion detection system (IDS) | Computational modeling | Security architecture | Defense in depth | Big data applications | Intrusion detection | Computer architecture | Servers | Honeypots | Firewalls | Cloud Computing
Conference Proceeding
Acta Informatica Pragensia, ISSN 1805-4951, 2012, Volume 1, Issue 1, pp. 50 - 59
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been... 
ICT Information and Communications Technologies | Attacks | Performance | Intrusion Detection Systems (IDS) | Suricata | GPU | Traffic
Journal Article
Journal of Applied Security Research, ISSN 1936-1610, 04/2014, Volume 9, Issue 2, pp. 133 - 149
Intrusion detection is one of the most interesting tasks for network administrators. There is a necessity in protecting the networks from known liabilities by... 
user to root (U2R) | distributed denial of service (DDOS) | asymmetric support vector machine (ASVM) | Intrusion detection system (IDS) | network intrusion detection system (NIDS) | support vector machine (SVM) | conditional random field (CRF) | remote to local (R2L) | false alarm rate (FAR)
Journal Article
電子情報通信学会技術研究報告. IA, インターネットアーキテクチャ, ISSN 0913-5685, 10/2014, Volume 114, pp. 91 - 96
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming important. However, continuous growth of... 
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 06/2017, Volume 87, pp. 185 - 192
Prior to deploying any intrusion detection system, it is essential to obtain a realistic evaluation of its performance. However, the major problems currently... 
Fuzzy logic | HIDS | IDS dataset | IDS | Dataset evaluation | Dataset realism | NIDS | NETWORK | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | CRITICAL INFRASTRUCTURE PROTECTION | PATTERNS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | Security software | Models | Analysis | Detectors
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.