X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (2130) 2130
Conference Proceeding (1664) 1664
Dissertation (168) 168
Publication (166) 166
Book Chapter (148) 148
Book / eBook (72) 72
Government Document (56) 56
Paper (54) 54
Newspaper Article (22) 22
Magazine Article (12) 12
Report (9) 9
Reference (5) 5
Book Review (4) 4
Standard (4) 4
Technical Report (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ids (2500) 2500
intrusion detection (807) 807
intrusion detection system (704) 704
security (374) 374
intrusion (346) 346
humans (294) 294
network security (238) 238
computer science (226) 226
analysis (224) 224
female (205) 205
intrusion detection systems (203) 203
eindringentdeckung (202) 202
detectors (200) 200
computer security (197) 197
male (196) 196
data mining (194) 194
computer science, information systems (187) 187
algorithms (183) 183
networks (180) 180
machine learning (178) 178
computer information security (177) 177
index medicus (175) 175
monitoring (173) 173
telecommunications (171) 171
security software (165) 165
anomaly detection (164) 164
adult (159) 159
engineering, electrical & electronic (154) 154
psychiatry (150) 150
middle aged (135) 135
symptomatology ids (132) 132
diebstahlsicherung (131) 131
data security (128) 128
internet (126) 126
ips (126) 126
cloud computing (124) 124
protocols (124) 124
classification (112) 112
snort (107) 107
computer networks (105) 105
ad hoc networks (104) 104
maschinelles lernen (102) 102
methods (102) 102
feature extraction (99) 99
wireless networks (96) 96
ip networks (95) 95
malware (95) 95
depression (94) 94
manet (94) 94
infrastruktur (93) 93
training (93) 93
neural networks (92) 92
information security (91) 91
artificial intelligence (89) 89
computer communication networks (88) 88
netzwerkverkehr (88) 88
servers (88) 88
computer science, artificial intelligence (87) 87
mobile ad hoc networks (87) 87
inventory (84) 84
wireless sensor networks (83) 83
feature selection (82) 82
engineering (81) 81
aged (80) 80
support vector machines (80) 80
firewall (79) 79
clustering (78) 78
databases (77) 77
research (77) 77
computers (76) 76
computer science, theory & methods (75) 75
adolescent (70) 70
denial of service attacks (70) 70
support vector machine (70) 70
ddos (69) 69
routing (69) 69
telecommunication traffic (69) 69
computer crime (68) 68
ids gene (67) 67
netzwerkeindringentdeckung (67) 67
sensors (63) 63
conferences (62) 62
dos (60) 60
information technology (60) 60
neuronales netzwerk (60) 60
attacks (59) 59
computer architecture (59) 59
software (59) 59
signatur (58) 58
information systems (57) 57
internet of things (55) 55
netzwerk-security (55) 55
reliability (55) 55
usage (55) 55
classification algorithms (54) 54
clinical neurology (54) 54
correlation (54) 54
mathematical models (54) 54
artificial neural networks (53) 53
computer science, hardware & architecture (53) 53
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (21) 21
Online Resources - Online (17) 17
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT at Mississauga - Stacks (8) 8
Faculty of Information - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
Gerstein Science - Stacks (2) 2
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
UofT at Scarborough - Stacks (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Robarts - Searching (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3543) 3543
Chinese (224) 224
Japanese (162) 162
French (33) 33
Korean (31) 31
German (18) 18
Spanish (14) 14
Portuguese (11) 11
Turkish (4) 4
Slovak (3) 3
Swedish (3) 3
Dutch (2) 2
Indonesian (2) 2
Catalan (1) 1
Czech (1) 1
Lithuanian (1) 1
Western Frisian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computers & Security, ISSN 0167-4048, 05/2020, Volume 92, p. 101732
Journal Article
Journal of Systems Architecture, ISSN 1383-7621, 05/2020, Volume 105, p. 101701
Ad hoc networks have been serving us in one way or the other, for two decades, through their vast variety of applications in majority fields. Due to their... 
IDS | Ad hoc networks | WSN | Security | Intrusion detection system | MANETs
Journal Article
Journal of New Music Research, ISSN 0929-8215, 03/2020, Volume 49, Issue 2, pp. 192 - 207
We present a study and reflection about the role and use of smartphone technology for a large-scale musical performance involving audience participation. We... 
ultrasound communication with high-frequency sound IDs | smartphone technology | co-design | live music | Technology-mediated audience participation (TMAP)
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 03/2020, Volume 16, Issue 3, pp. 1947 - 1956
Internet of Things (IoT) has evolved for building smart environments in a distributed system, where the data produced by IoT devices are transmitted through... 
functional link artificial neural network (FLANN) | Internet of Things (IoT) | metaheuristic | Image edge detection | Neural networks | Ecosystems | Intrusion detection | intrusion detection system (IDS) | Servers | Optimization | Edge computing | elitism
Journal Article
Journal of Environmental Engineering, ISSN 0733-9372, 03/2020, Volume 146, Issue 3, p. 4020006
Journal Article
Knowledge-Based Systems, ISSN 0950-7051, 02/2020, Volume 189, p. 105084
Daily dialogues are full of emotions that control the trends of dialogues and influence the attitudes of interlocutors toward each other, and understanding the... 
Textual dialogue | Emotion recognition | Data-driven | IDS-ECM | Emotion prediction | Macro-average F1 score | Human–computer interaction | Computer simulation | Emotions | Predictions | Dependence | Man machine interaction
Journal Article
Mobile Networks and Applications, ISSN 1383-469X, 2019, Volume 25, Issue 1, pp. 164 - 172
Journal Article
IEEE Internet of Things Journal, ISSN 2327-4662, 1/2020, pp. 1 - 1
Cyber-threat protection is today one of the most challenging research branches of Information Technology, while the exponentially-increasing number of tiny,... 
Intrusion Detection | Anomaly Detection | Open-source | Edge Computing | IDS | Cybersecurity | Internet of Things
Journal Article
Telegraph - Herald, ISSN 1041-293X, 01/2020
Newspaper Article
Electronics, ISSN 2079-9292, 01/2020, Volume 9, Issue 1, p. 181
Security is crucial in cyber-physical systems (CPS). As a typical CPS, the communication-based train control (CBTC) system is facing increasingly serious... 
cbtc | ids | cybersecurity | cps
Journal Article
Electronics, ISSN 2079-9292, 01/2020, Volume 9, Issue 1, p. 144
The application of a large number of Internet of Things (IoT) devices makes our life more convenient and industries more efficient. However, it also makes... 
ids | ddos attack | machine learning | feature selection | iot | raspberry pi
Journal Article
2020, ISBN 9781464814617
International Debt Statistics (IDS) is a longstanding annual publication of the World Bank featuring external debt statistics and analysis for the 122 low- and... 
DEBTOR | ECONOMIC | PUBLIC SECTOR | STATISTICS | FOREIGN DIRECT INVESTMENT | MATURITY | DEBT | CREDITOR | LOANS | DEVELOPING | DATA | FINANCE | DEVELOPMENT | BONDS | PRINCIPAL | IDS | GOVERNMENT
Book
Journal of Affective Disorders, ISSN 0165-0327, 01/2020, Volume 260, pp. 77 - 83
•Long term (9-year) stability was moderate to high for symptoms of affective disorders.•Long term stability was similarly high for trait markers such as... 
Affective disorder | Temporal stability | Personality | Cognitive vulnerability | Anxiety disorder | Depressive disorder | Psychiatry and Mental health | Clinical Psychology | METAANALYSIS | PSYCHIATRY | REACTIVITY | RELIABILITY | DEPRESSIVE SYMPTOMATOLOGY IDS | CLINICAL NEUROLOGY | RELAPSE | INVENTORY | ANXIETY DISORDERS | TRAITS | VALIDITY | ASSOCIATION
Journal Article
Reliability Engineering and System Safety, ISSN 0951-8320, 01/2020, Volume 193, p. 106675
•An intrusion detection system has been proposed in the proposed design to protect against the security problems using the human immune system (HIS).•In this... 
Security threats | Unmanned Aerial Systems | IDS | HIS | Routing security | SUAS-HIS | INTRUSION DETECTION | ATTACKS | NETWORKS | TAXONOMY | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | VEHICLES | PHOTOGRAMMETRY | ENGINEERING, INDUSTRIAL | Design | Fighting | Intrusion | Antigens | Antibodies | Unmanned aerial vehicles | Mapping | Performance measurement | Security | Immune system
Journal Article
Journal of Counseling & Development, ISSN 0748-9633, 01/2020, Volume 98, Issue 1, pp. 3 - 16
Journal Article
IET Information Security, ISSN 1751-8709, 1/2020, Volume 14, Issue 1, pp. 89 - 98
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 01/2020, Volume 61, p. 101105
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system... 
MQTT | IDS | Replay attacks | ECC | IoT | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | AUTHENTICATION SCHEME | EDGE
Journal Article
2019 IEEE International Conference on Electro Information Technology (EIT), 05/2019, pp. 298 - 303
Smart grid is an emerging and promising technology. It uses the power of information technologies to deliver intelligently the electrical power to customers,... 
Naïve Bayes | probability of false alarm | Data mining | probability of detection | Random Forest | Support vector machines | Training | IDS | Data models | Data mining algorithms | Smart grids | Decision trees | Smart Grid
Conference Proceeding
Columbian, ISSN 1043-4151, 12/2019
Newspaper Article