X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2130) 2130
Conference Proceeding (1664) 1664
Dissertation (168) 168
Publication (166) 166
Book Chapter (148) 148
Book / eBook (72) 72
Government Document (56) 56
Paper (54) 54
Newspaper Article (22) 22
Magazine Article (12) 12
Report (9) 9
Reference (5) 5
Book Review (4) 4
Standard (4) 4
Technical Report (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (2500) 2500
intrusion detection (807) 807
intrusion detection system (704) 704
security (374) 374
intrusion (346) 346
humans (294) 294
network security (238) 238
computer science (226) 226
analysis (224) 224
female (205) 205
intrusion detection systems (203) 203
eindringentdeckung (202) 202
detectors (200) 200
computer security (197) 197
male (196) 196
data mining (194) 194
computer science, information systems (187) 187
algorithms (183) 183
networks (180) 180
machine learning (178) 178
computer information security (177) 177
index medicus (175) 175
monitoring (173) 173
telecommunications (171) 171
security software (165) 165
anomaly detection (164) 164
adult (159) 159
engineering, electrical & electronic (154) 154
psychiatry (150) 150
middle aged (135) 135
symptomatology ids (132) 132
diebstahlsicherung (131) 131
data security (128) 128
internet (126) 126
ips (126) 126
cloud computing (124) 124
protocols (124) 124
classification (112) 112
snort (107) 107
computer networks (105) 105
ad hoc networks (104) 104
maschinelles lernen (102) 102
methods (102) 102
feature extraction (99) 99
wireless networks (96) 96
ip networks (95) 95
malware (95) 95
depression (94) 94
manet (94) 94
infrastruktur (93) 93
training (93) 93
neural networks (92) 92
information security (91) 91
artificial intelligence (89) 89
computer communication networks (88) 88
netzwerkverkehr (88) 88
servers (88) 88
computer science, artificial intelligence (87) 87
mobile ad hoc networks (87) 87
inventory (84) 84
wireless sensor networks (83) 83
feature selection (82) 82
engineering (81) 81
aged (80) 80
support vector machines (80) 80
firewall (79) 79
clustering (78) 78
databases (77) 77
research (77) 77
computers (76) 76
computer science, theory & methods (75) 75
adolescent (70) 70
denial of service attacks (70) 70
support vector machine (70) 70
ddos (69) 69
routing (69) 69
telecommunication traffic (69) 69
computer crime (68) 68
ids gene (67) 67
netzwerkeindringentdeckung (67) 67
sensors (63) 63
conferences (62) 62
dos (60) 60
information technology (60) 60
neuronales netzwerk (60) 60
attacks (59) 59
computer architecture (59) 59
software (59) 59
signatur (58) 58
information systems (57) 57
internet of things (55) 55
netzwerk-security (55) 55
reliability (55) 55
usage (55) 55
classification algorithms (54) 54
clinical neurology (54) 54
correlation (54) 54
mathematical models (54) 54
artificial neural networks (53) 53
computer science, hardware & architecture (53) 53
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (21) 21
Online Resources - Online (17) 17
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT at Mississauga - Stacks (8) 8
Faculty of Information - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
Gerstein Science - Stacks (2) 2
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
UofT at Scarborough - Stacks (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Robarts - Searching (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3543) 3543
Chinese (224) 224
Japanese (162) 162
French (33) 33
Korean (31) 31
German (18) 18
Spanish (14) 14
Portuguese (11) 11
Turkish (4) 4
Slovak (3) 3
Swedish (3) 3
Dutch (2) 2
Indonesian (2) 2
Catalan (1) 1
Czech (1) 1
Lithuanian (1) 1
Western Frisian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Expert Systems With Applications, ISSN 0957-4174, 2010, Volume 37, Issue 9, pp. 6225 - 6232
Journal Article
IOP Conference Series: Materials Science and Engineering, ISSN 1757-8981, 04/2017, Volume 190, Issue 1, p. 12023
Conference Proceeding
Computers and Electrical Engineering, ISSN 0045-7906, 04/2017, Volume 59, pp. 189 - 200
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2015, Volume 48, Issue 1, pp. 1 - 41
The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we... 
measurement methodology | metrics | workload generation | Computer intrusion detection systems | Workload generation | Metrics | Measurement methodology | COMPUTER SCIENCE, THEORY & METHODS | NIDS | Surveys | Evaluation | Security software | Detectors | Design engineering | Intrusion | Methodology | Computation | Surveying | Computer information security | Workload
Journal Article
Advanced Science Letters, ISSN 1936-6612, 10/2016, Volume 22, Issue 10, pp. 2827 - 2831
Journal Article
Information (Switzerland), ISSN 2078-2489, 05/2016, Volume 7, Issue 2, p. 25
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol... 
Specification-based | IDS | 6LoWPAN | Internal threats | Topology attacks | RPL | internal threats | topology attacks | specification-based
Journal Article
International Journal of Security and Its Applications, ISSN 1738-9976, 08/2016, Volume 10, Issue 8, pp. 335 - 342
In this paper we have proposed a hybrid intrusion detection system consisting of a misuse detection model based upon a Binary Tree of Classifiers as the first... 
Data mining | Intrusion detection system | Hybrid IDS
Journal Article
Asian Journal of Information Technology, ISSN 1682-3915, 2016, Volume 15, Issue 6, pp. 1106 - 1115
Journal Article
Contributions to Indian Sociology, ISSN 0069-9667, 10/2018, Volume 52, Issue 3, pp. 336 - 342
The Aadhaar project which aims to provide all residents in India with a unique identity number requires much more attention from sociologists of India. There... 
privacy | ethnography of the state | digital IDs | Surveillance | democracy | SOCIOLOGY
Journal Article
International Journal of Critical Infrastructure Protection, ISSN 1874-5482, 09/2018, Volume 22, pp. 113 - 124
Attacks to Cyber Physical Systems (CPSs) are detected by Industrial Intrusion Detection Systems (IIDSs). Operation of stage-based CPSs (those for which their... 
Cyber Physical System (CPS) | Industrial Control | Security | Intrusion Detection System (IDS) | Process Control | ATTACKS | ENGINEERING, MULTIDISCIPLINARY | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 645, pp. 257 - 268
Journal Article
Sensors (Switzerland), ISSN 1424-8220, 08/2016, Volume 16, Issue 8, p. 1311
Journal Article
Applied Mechanics and Materials, ISSN 1660-9336, 09/2014, Volume 651-653, pp. 1772 - 1775
The abilities of summarization, learning and self-fitting and inner-parallel computing make artificial neural networks suitable for intrusion detection. On the... 
Data fusion | IDS | Neural network
Journal Article
2020, ISBN 9781464814617
International Debt Statistics (IDS) is a longstanding annual publication of the World Bank featuring external debt statistics and analysis for the 122 low- and... 
DEBTOR | ECONOMIC | PUBLIC SECTOR | STATISTICS | FOREIGN DIRECT INVESTMENT | MATURITY | DEBT | CREDITOR | LOANS | DEVELOPING | DATA | FINANCE | DEVELOPMENT | BONDS | PRINCIPAL | IDS | GOVERNMENT
Book
Pervasive and Mobile Computing, ISSN 1574-1192, 01/2020, Volume 61, p. 101105
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system... 
MQTT | IDS | Replay attacks | ECC | IoT | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | AUTHENTICATION SCHEME | EDGE
Journal Article
2013, ISBN 1849647682, x, 222
Based on first-hand accounts and extensive fieldwork, 'Unfree in Palestine' reveals the role played by identity documents in Israel's apartheid policies... 
Palestinian Arabs | Identification cards | Race discrimination | Privacy, Right of | Law and legislation | Social conditions
Book
International Journal of Pure and Applied Mathematics, ISSN 1311-8080, 2017, Volume 115, Issue 7, pp. 231 - 238
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9639, pp. 138 - 154
Conference Proceeding
Advanced Materials Research, ISSN 1022-6680, 07/2014, Volume 989-994, pp. 4690 - 4693
With the growing demand for information, it has a strategic importance for the future of sustainable development how to create a safe and robust network system... 
IDS | SDN | Security | Framework | Firewall
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.