X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (12104) 12104
Journal Article (7411) 7411
Newspaper Article (1595) 1595
Publication (466) 466
Trade Publication Article (451) 451
Dissertation (449) 449
Book Chapter (409) 409
Government Document (359) 359
Magazine Article (259) 259
Book / eBook (98) 98
Book Review (98) 98
Web Resource (18) 18
Reference (8) 8
Standard (6) 6
Paper (4) 4
Technical Report (4) 4
Data Set (2) 2
Report (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
intrusion detection (14544) 14544
intrusion detection systems (3988) 3988
network security (2522) 2522
intrusion detection system (2439) 2439
computer security (2331) 2331
security (1866) 1866
computer science (1851) 1851
intrusion (1629) 1629
computer networks (1621) 1621
data mining (1561) 1561
monitoring (1474) 1474
information security (1318) 1318
anomaly detection (1303) 1303
computer science, information systems (1274) 1274
data security (1257) 1257
ids (1250) 1250
internet (1155) 1155
machine learning (1144) 1144
engineering, electrical & electronic (1116) 1116
telecommunication traffic (1091) 1091
algorithms (1056) 1056
telecommunications (1040) 1040
networks (1014) 1014
detectors (960) 960
protection (948) 948
protocols (931) 931
computer information security (908) 908
wireless sensor networks (842) 842
feature extraction (778) 778
ip networks (742) 742
security software (727) 727
training (727) 727
computer crime (725) 725
neural networks (716) 716
analysis (703) 703
wireless networks (673) 673
databases (671) 671
testing (647) 647
support vector machines (643) 643
artificial intelligence (618) 618
classification (596) 596
algorithm design and analysis (582) 582
studies (574) 574
computer architecture (552) 552
sensors (543) 543
pattern matching (538) 538
security management (530) 530
cloud computing (515) 515
computer science, theory & methods (491) 491
hardware (491) 491
clustering algorithms (489) 489
network intrusion detection (489) 489
computer science, artificial intelligence (488) 488
ad hoc networks (486) 486
computers (472) 472
application software (466) 466
diebstahlsicherung (457) 457
classification algorithms (443) 443
conferences (439) 439
data encryption (429) 429
servers (428) 428
computer science, hardware & architecture (426) 426
malware (416) 416
routing (414) 414
educational institutions (413) 413
inventors (407) 407
cryptography (406) 406
communication system security (400) 400
support vector machine (396) 396
mobile ad hoc networks (395) 395
software (395) 395
authentication (393) 393
methods (392) 392
feature selection (389) 389
access control (388) 388
accuracy (387) 387
information technology (387) 387
computer science, software engineering (385) 385
clustering (384) 384
computational modeling (373) 373
control systems (366) 366
costs (366) 366
information systems (366) 366
operating systems (359) 359
laboratories (350) 350
computer communication networks (343) 343
genetic algorithms (333) 333
humans (333) 333
artificial neural networks (326) 326
immune system (322) 322
engines (319) 319
mathematical models (312) 312
traffic control (312) 312
optimization (310) 310
research (303) 303
eindringentdeckung (301) 301
engineering (292) 292
computer simulation (291) 291
denial of service attacks (290) 290
electronic mail (289) 289
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (21209) 21209
Chinese (236) 236
Japanese (108) 108
Korean (77) 77
Portuguese (39) 39
Turkish (15) 15
Spanish (14) 14
German (9) 9
French (3) 3
Lithuanian (2) 2
Polish (2) 2
Russian (2) 2
Czech (1) 1
Indonesian (1) 1
Persian (1) 1
Slovak (1) 1
Swedish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


ACM Computing Surveys (CSUR), ISSN 0360-0300, 11/2019, Volume 52, Issue 6, pp. 1 - 35
This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS... 
host | Intrusion detection | anomaly detection
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 2212, pp. 85 - 103
Conference Proceeding
Performance Evaluation Review, ISSN 0163-5999, 2014, Volume 41, Issue 4, pp. 70 - 73
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7531, pp. 240 - 253
Conference Proceeding
World Applied Sciences Journal, ISSN 1818-4952, 2013, Volume 27, Issue 11, pp. 1461 - 1465
Journal Article
Computers & Security, ISSN 0167-4048, 05/2012, Volume 31, Issue 3, pp. 357 - 374
In network intrusion detection, anomaly-based approaches in particular suffer from accurate evaluation, comparison, and deployment which originates from the... 
Intrusion detection | Network traffic profile | Dataset generation | COMPUTER SCIENCE, INFORMATION SYSTEMS | Computer network protocols | Analysis
Journal Article
Knowledge-Based Systems, ISSN 0950-7051, 10/2019, p. 105124
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 1, pp. 18 - 28
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing... 
Network security | Intrusion detection | Anomaly detection | IDS systems and platforms | Assessment | Threat | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Advances in Information Security, ISSN 1568-2633, 2018, Volume 70, pp. 239 - 258
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 05/2018, Volume 82, pp. 395 - 411
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and... 
Network security | IoT security | IoT protocols | Data security | Blockchain | SECRECY | ATTACKS | INTERNET | PRIVACY | INTRUSION DETECTION SYSTEMS | AUTHENTICATION | THINGS | ROUTING PROTOCOL | COMPUTER SCIENCE, THEORY & METHODS | TRUST
Journal Article
2018, 1, CRC series in security, privacy and trust, ISBN 1315305836, xiv, 544 pages
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks,... 
Security measures | Mobile communication systems | Intrusion detection systems (Computer security) | Internet & Multimedia | Telecommunications | IT Security
Book
International Journal of Pure and Applied Mathematics, ISSN 1311-8080, 2017, Volume 116, Issue 23, pp. 399 - 403
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 04/2014, Volume 46, Issue 4, pp. 1 - 29
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in... 
Cyber-physical systems | security | intrusion detection | classification | Security | Intrusion detection | Classification | PERFORMANCE ANALYSIS | MANAGEMENT | COMPUTER SCIENCE, THEORY & METHODS | ALGORITHMS | Surveys | Drone aircraft | Security software | Vehicles, Remotely piloted | Methods | Detectors
Journal Article
Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, ISSN 1543-7221, 10/2011, pp. 15 - 26
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis... 
crowdsourcing | data mining | smartphone security | malware detection | anomaly detection | dynamic analysis | intrusion detection
Conference Proceeding
ACM Transactions on Modeling and Computer Simulation (TOMACS), ISSN 1049-3301, 11/2019, Volume 29, Issue 4, pp. 1 - 25
The risk posed by insider threats has usually been approached by analyzing the behavior of users solely in the cyber domain. In this article, we show the... 
physical movement | intrusion detection | Railway transportation system
Journal Article
Optics Express, ISSN 1094-4087, 04/2014, Volume 22, Issue 8, pp. 8823 - 8830
We describe a dynamic Optical Frequency Domain Reflectometry (OFDR) system which enables real time, long range, acoustic sensing at high sampling rate. The... 
INTRUSION DETECTION | SYSTEM | OFDR | OPTICS | PHASE-OTDR | SPATIAL-RESOLUTION
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 11/2019, pp. 1 - 1
Controller area network with flexible data rate (CAN-FD) is a widely used communication protocol for in-vehicle sensing and control. However, due to the lack... 
in-vehicle networks | CAN-FD protocol | Intrusion detection | topology verification
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2015, Volume 17, Issue 3, pp. 1294 - 1312
The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating... 
End-to-end security | Protocols | Internet of Things | Security | RPL | IEEE 802.15 Standards | DTLS | IEEE 802.15.4 | 6LoWPAN | Internet | Sensors | CoAP | Cryptography | Internet of things | security | WIRELESS | end-to-end security | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | INTRUSION DETECTION SYSTEMS | Economics | Platforms | Strategy | Detection | Protocol (computers) | Computer information security
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 11/2016, Volume 75, pp. 58 - 76
Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for... 
Malware | Mobile malware | Bibliometric analysis | Malware analysis | Intrusion detection system
Journal Article
Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, 10/2005, pp. 16 - 23
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become... 
security | intrusion detection | wireless sensor networks | Security | Wireless Sensor Networks | Intrusion detection
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.