X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2130) 2130
Conference Proceeding (1664) 1664
Dissertation (168) 168
Publication (166) 166
Book Chapter (148) 148
Book / eBook (72) 72
Government Document (56) 56
Paper (54) 54
Newspaper Article (22) 22
Magazine Article (12) 12
Report (9) 9
Reference (5) 5
Book Review (4) 4
Standard (4) 4
Technical Report (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (2500) 2500
intrusion detection (807) 807
intrusion detection system (704) 704
security (374) 374
intrusion (346) 346
humans (294) 294
network security (238) 238
computer science (226) 226
analysis (224) 224
female (205) 205
intrusion detection systems (203) 203
eindringentdeckung (202) 202
detectors (200) 200
computer security (197) 197
male (196) 196
data mining (194) 194
computer science, information systems (187) 187
algorithms (183) 183
networks (180) 180
machine learning (178) 178
computer information security (177) 177
index medicus (175) 175
monitoring (173) 173
telecommunications (171) 171
security software (165) 165
anomaly detection (164) 164
adult (159) 159
engineering, electrical & electronic (154) 154
psychiatry (150) 150
middle aged (135) 135
symptomatology ids (132) 132
diebstahlsicherung (131) 131
data security (128) 128
internet (126) 126
ips (126) 126
cloud computing (124) 124
protocols (124) 124
classification (112) 112
snort (107) 107
computer networks (105) 105
ad hoc networks (104) 104
maschinelles lernen (102) 102
methods (102) 102
feature extraction (99) 99
wireless networks (96) 96
ip networks (95) 95
malware (95) 95
depression (94) 94
manet (94) 94
infrastruktur (93) 93
training (93) 93
neural networks (92) 92
information security (91) 91
artificial intelligence (89) 89
computer communication networks (88) 88
netzwerkverkehr (88) 88
servers (88) 88
computer science, artificial intelligence (87) 87
mobile ad hoc networks (87) 87
inventory (84) 84
wireless sensor networks (83) 83
feature selection (82) 82
engineering (81) 81
aged (80) 80
support vector machines (80) 80
firewall (79) 79
clustering (78) 78
databases (77) 77
research (77) 77
computers (76) 76
computer science, theory & methods (75) 75
adolescent (70) 70
denial of service attacks (70) 70
support vector machine (70) 70
ddos (69) 69
routing (69) 69
telecommunication traffic (69) 69
computer crime (68) 68
ids gene (67) 67
netzwerkeindringentdeckung (67) 67
sensors (63) 63
conferences (62) 62
dos (60) 60
information technology (60) 60
neuronales netzwerk (60) 60
attacks (59) 59
computer architecture (59) 59
software (59) 59
signatur (58) 58
information systems (57) 57
internet of things (55) 55
netzwerk-security (55) 55
reliability (55) 55
usage (55) 55
classification algorithms (54) 54
clinical neurology (54) 54
correlation (54) 54
mathematical models (54) 54
artificial neural networks (53) 53
computer science, hardware & architecture (53) 53
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (21) 21
Online Resources - Online (17) 17
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT at Mississauga - Stacks (8) 8
Faculty of Information - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
Gerstein Science - Stacks (2) 2
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
UofT at Scarborough - Stacks (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Robarts - Searching (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3543) 3543
Chinese (224) 224
Japanese (162) 162
French (33) 33
Korean (31) 31
German (18) 18
Spanish (14) 14
Portuguese (11) 11
Turkish (4) 4
Slovak (3) 3
Swedish (3) 3
Dutch (2) 2
Indonesian (2) 2
Catalan (1) 1
Czech (1) 1
Lithuanian (1) 1
Western Frisian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Chemical and Pharmaceutical Sciences, ISSN 0974-2115, 04/2016, Volume 9, Issue 2, pp. E368 - E373
Journal Article
Concurrency Computation, ISSN 1532-0626, 2019, p. e5242
Journal Article
Information Technology Journal, ISSN 1812-5638, 2014, Volume 13, Issue 13, pp. 2065 - 2078
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 06/2018, Volume 31, Issue 9, pp. e3547 - n/a
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 06/2017, Volume 87, pp. 185 - 192
Prior to deploying any intrusion detection system, it is essential to obtain a realistic evaluation of its performance. However, the major problems currently... 
Fuzzy logic | HIDS | IDS dataset | IDS | Dataset evaluation | Dataset realism | NIDS | NETWORK | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | CRITICAL INFRASTRUCTURE PROTECTION | PATTERNS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | Security software | Models | Analysis | Detectors
Journal Article
Computers & Security, ISSN 0167-4048, 03/2018, Volume 73, pp. 411 - 424
The evaluation of algorithms and techniques to implement intrusion detection systems heavily rely on the existence of well designed datasets. In the last... 
Network security | IDS | Netflow | Dataset | Network traffic
Journal Article
2010, 1., Germanistische Bibliothek, ISBN 3825357937, Volume 38
Book
Expert Systems With Applications, ISSN 0957-4174, 12/2017, Volume 88, pp. 249 - 257
•A Feature reduced Intrusion Detection System has been proposed.•Pre-processing is done to compensate less occurring and frequent occurring attacks.•Feature... 
Feature Reduction | ANN | Feature Ranking | Intrusion Detection System (IDS) | FEATURE-SELECTION | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | INFORMATION | ALGORITHM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC | Security software | Rankings | Neural networks | Analysis | Detectors
Journal Article
International journal of molecular sciences, ISSN 1422-0067, 12/2019, Volume 21, Issue 1, p. 114
Hunter syndrome (mucopolysaccharidosis II; MPS II) is caused by a defect of the iduronate-2-sulfatase ( ) gene. Few studies have reported integrated mutation... 
genotype–phenotype correlation | mucopolysaccharidosis ii (mps ii) | iduronate-2-sulfatase (ids) gene | hunter syndrome | ids enzyme activity | cos-7 cell transfection
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 1, pp. 18 - 28
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing... 
Network security | Intrusion detection | Anomaly detection | IDS systems and platforms | Assessment | Threat | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Neurocomputing, ISSN 0925-2312, 09/2015, Volume 164, pp. 71 - 81
The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and... 
IDS | Probabilistic SOM | Bayesian SOM | Self-organizing maps | PCA filtering | FEATURE-SELECTION | ALGORITHM | DETECTION SYSTEM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Security software | Analysis | Detectors | Machine learning
Journal Article
Electronics, ISSN 2079-9292, 01/2020, Volume 9, Issue 1, p. 181
Security is crucial in cyber-physical systems (CPS). As a typical CPS, the communication-based train control (CBTC) system is facing increasingly serious... 
cbtc | ids | cybersecurity | cps
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 48, Issue C, pp. 338 - 346
An Intrusion Detection System (IDS) is a software application or device that monitors the system or activities of network for policy violations or malicious... 
IDS | Oulier | Anomaly
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 48, Issue C, pp. 503 - 506
The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more aware of the importance of the... 
IDS | OSI | Attacks | Network Security
Journal Article
ARPN Journal of Engineering and Applied Sciences, 07/2018, Volume 13, Issue 14, pp. 4387 - 4392
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 638, pp. 97 - 109
MANET | MNs | IDS | ACO
Conference Proceeding
KSII Transactions on Internet and Information Systems (TIIS), ISSN 1976-7277, 2017, Volume 11, Issue 10, p. 5132
Cyber attacks are evolving commensurate with recent developments in information security technology. Intrusion detection systems collect various types of data... 
IDS | SFFS | FeatureSelection | RandomForest
Journal Article
IEEE Access, ISSN 2169-3536, 2017, Volume 5, pp. 21954 - 21961
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network.... 
Training | Support vector machines | deep learning | Recurrent neural networks | Computational modeling | RNN-IDS | Intrusion detection | Machine learning | Testing | intrusion detection | machine learning | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.