X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2129) 2129
Conference Proceeding (1665) 1665
Dissertation (168) 168
Publication (165) 165
Book Chapter (148) 148
Book / eBook (72) 72
Government Document (56) 56
Paper (53) 53
Newspaper Article (22) 22
Magazine Article (12) 12
Report (9) 9
Reference (5) 5
Book Review (4) 4
Standard (4) 4
Technical Report (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (2500) 2500
intrusion detection (805) 805
intrusion detection system (702) 702
security (372) 372
intrusion (344) 344
humans (293) 293
network security (238) 238
computer science (224) 224
analysis (222) 222
female (204) 204
eindringentdeckung (202) 202
intrusion detection systems (202) 202
detectors (199) 199
computer security (197) 197
male (195) 195
data mining (194) 194
computer science, information systems (187) 187
algorithms (181) 181
networks (179) 179
machine learning (178) 178
computer information security (176) 176
index medicus (175) 175
monitoring (173) 173
telecommunications (172) 172
anomaly detection (165) 165
security software (163) 163
adult (158) 158
engineering, electrical & electronic (155) 155
psychiatry (149) 149
middle aged (134) 134
symptomatology ids (132) 132
diebstahlsicherung (130) 130
data security (128) 128
internet (126) 126
ips (126) 126
cloud computing (124) 124
protocols (124) 124
classification (110) 110
snort (107) 107
ad hoc networks (104) 104
computer networks (104) 104
maschinelles lernen (103) 103
methods (101) 101
feature extraction (99) 99
depression (95) 95
malware (95) 95
wireless networks (95) 95
ip networks (94) 94
manet (94) 94
infrastruktur (93) 93
training (93) 93
information security (91) 91
neural networks (90) 90
artificial intelligence (88) 88
computer communication networks (88) 88
netzwerkverkehr (88) 88
computer science, artificial intelligence (87) 87
servers (87) 87
mobile ad hoc networks (86) 86
inventory (84) 84
wireless sensor networks (83) 83
feature selection (82) 82
engineering (81) 81
aged (80) 80
support vector machines (80) 80
firewall (79) 79
clustering (78) 78
databases (77) 77
research (77) 77
computers (76) 76
computer science, theory & methods (75) 75
adolescent (70) 70
denial of service attacks (70) 70
support vector machine (70) 70
ddos (69) 69
routing (69) 69
telecommunication traffic (69) 69
computer crime (68) 68
ids gene (68) 68
netzwerkeindringentdeckung (67) 67
sensors (63) 63
conferences (62) 62
dos (60) 60
information technology (60) 60
neuronales netzwerk (60) 60
attacks (59) 59
computer architecture (59) 59
software (59) 59
signatur (58) 58
information systems (57) 57
internet of things (55) 55
netzwerk-security (55) 55
reliability (55) 55
usage (55) 55
classification algorithms (54) 54
clinical neurology (54) 54
correlation (54) 54
mathematical models (54) 54
artificial neural networks (53) 53
computer science, hardware & architecture (53) 53
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (21) 21
Online Resources - Online (17) 17
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT at Mississauga - Stacks (8) 8
Faculty of Information - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
Gerstein Science - Stacks (2) 2
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
UofT at Scarborough - Stacks (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Robarts - Searching (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3541) 3541
Chinese (225) 225
Japanese (162) 162
French (33) 33
Korean (31) 31
German (18) 18
Spanish (16) 16
Portuguese (11) 11
Turkish (4) 4
Slovak (3) 3
Swedish (3) 3
Dutch (2) 2
Indonesian (2) 2
Catalan (1) 1
Czech (1) 1
Lithuanian (1) 1
Western Frisian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


COMPUTERS & SECURITY, ISSN 0167-4048, 03/2018, Volume 73, pp. 411 - 424
The evaluation of algorithms and techniques to implement intrusion detection systems heavily rely on the existence of well designed datasets. In the last... 
SUPPORT | Dataset | Network traffic | Network security | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDS | Netflow | SYSTEMS | Analysis | Algorithms | Detectors
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 09/2019, Volume 130, pp. 79 - 83
•Test dataset can never be modified.•Optimal Training dataset composition for detection of minority classes.•Feature selection without under-sampling performs... 
Training-Test dataset composition | Feature selection | Intrusion Detection System (IDS) | Security software | Algorithms | Detectors | Datasets | Performance evaluation | Training | Intrusion | Classifiers | Data sets | Classification | Oversampling | Bayesian analysis | Expert systems | Intrusion detection systems
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11170, pp. 206 - 226
Journal Article
International Journal of Network Security, ISSN 1816-353X, 03/2014, Volume 16, Issue 2, pp. 81 - 89
Journal Article
Computers & Security, ISSN 0167-4048, 01/2020, p. 101732
Journal Article
Journal of Engineering and Applied Sciences, ISSN 1816-949X, 09/2017, Volume 12, Issue 16, pp. 4180 - 4185
ANN | ELM | SLFN | IDS | Malaysia
Journal Article
Tijdschrift voor Psychiatrie, ISSN 0303-7339, 01/2016, Volume 58, Issue 1, pp. 48 - 54
Journal Article
Journal of Physics: Conference Series, ISSN 1742-6588, 06/2018, Volume 1028, Issue 1, p. 12227
Conference Proceeding
Proceedings of the 26th Annual Computer Security Applications Conference, ISSN 1063-9527, 12/2010, pp. 131 - 140
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same... 
network security | IDS | P2P botnet
Conference Proceeding
2016, 1, ISBN 1498717446, xvii, 242
Many types of security technologies are currently in use, with biometrics being one of the latest and most cutting-edge forms that has been produced for mass... 
Biometric identification | Industrial applications | Social aspects | Computer security | Biotechnology | Electronics & communications engineering | Machine Learning | Enterprise Resource Management (ERP) | Homeland Security | Biometric identification - Industrial applications
Book
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 266 - 282
Journal Article
Journal of Systems Architecture, ISSN 1383-7621, 05/2020, Volume 105, p. 101701
Ad hoc networks have been serving us in one way or the other, for two decades, through their vast variety of applications in majority fields. Due to their... 
IDS | Ad hoc networks | WSN | Security | Intrusion detection system | MANETs
Journal Article
International Journal of Interactive Mobile Technologies, ISSN 1865-7923, 2019, Volume 13, Issue 1, pp. 70 - 84
Abstract— Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the... 
MLP | IDS | Naïve Bayes | DDoS | Random Forest | IDS, DDoS, MLP, Naïve Bayes, Random Forest
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2015, Volume 325, pp. 51 - 59
Conference Proceeding
Applied Soft Computing, ISSN 1568-4946, 01/2016, Volume 38, pp. 360 - 372
The objective of this paper is to develop ensemble based classifiers that will improve the accuracy of Intrusion Detection. For this purpose, we trained and... 
k-NN | LUS | SVM | PSO | Weighted majority voting (WMV) | Ensemble | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | k NN | ALGORITHM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Wildlife management areas | Security software | Algorithms | Analysis | Methods | Detectors
Journal Article
International Journal of Network Management, ISSN 1055-7148, 01/2018, Volume 28, Issue 1, pp. e1996 - n/a
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 2009, Volume 36, Issue 10, pp. 11994 - 12000
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to... 
Hybrid classifiers | Intrusion detection | Ensemble classifiers | Machine learning | COMPUTER-NETWORKS | ALGORITHM | MODEL | DETECTION SYSTEM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | NEAREST NEIGHBOR CLASSIFIER | ENGINEERING, ELECTRICAL & ELECTRONIC | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | NEURAL-NETWORKS | IDS | Security software | Detectors
Journal Article
Journal of Telecommunication, Electronic and Computer Engineering, ISSN 2180-1843, 2017, Volume 9, Issue 2-4, pp. 107 - 111
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 02/2019, Volume 128, pp. 33 - 55
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.