ACM Computing Surveys (CSUR), ISSN 0360-0300, 11/2019, Volume 52, Issue 6, pp. 1 - 35
This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS...
host | Intrusion detection | anomaly detection
host | Intrusion detection | anomaly detection
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 2212, pp. 85 - 103
Conference Proceeding
Performance Evaluation Review, ISSN 0163-5999, 2014, Volume 41, Issue 4, pp. 70 - 73
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7531, pp. 240 - 253
Conference Proceeding
World Applied Sciences Journal, ISSN 1818-4952, 2013, Volume 27, Issue 11, pp. 1461 - 1465
Journal Article
Computers & Security, ISSN 0167-4048, 05/2012, Volume 31, Issue 3, pp. 357 - 374
In network intrusion detection, anomaly-based approaches in particular suffer from accurate evaluation, comparison, and deployment which originates from the...
Intrusion detection | Network traffic profile | Dataset generation | COMPUTER SCIENCE, INFORMATION SYSTEMS | Computer network protocols | Analysis
Intrusion detection | Network traffic profile | Dataset generation | COMPUTER SCIENCE, INFORMATION SYSTEMS | Computer network protocols | Analysis
Journal Article
Knowledge-Based Systems, ISSN 0950-7051, 10/2019, p. 105124
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 1, pp. 18 - 28
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing...
Network security | Intrusion detection | Anomaly detection | IDS systems and platforms | Assessment | Threat | COMPUTER SCIENCE, INFORMATION SYSTEMS
Network security | Intrusion detection | Anomaly detection | IDS systems and platforms | Assessment | Threat | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Advances in Information Security, ISSN 1568-2633, 2018, Volume 70, pp. 239 - 258
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 05/2018, Volume 82, pp. 395 - 411
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and...
Network security | IoT security | IoT protocols | Data security | Blockchain | SECRECY | ATTACKS | INTERNET | PRIVACY | INTRUSION DETECTION SYSTEMS | AUTHENTICATION | THINGS | ROUTING PROTOCOL | COMPUTER SCIENCE, THEORY & METHODS | TRUST
Network security | IoT security | IoT protocols | Data security | Blockchain | SECRECY | ATTACKS | INTERNET | PRIVACY | INTRUSION DETECTION SYSTEMS | AUTHENTICATION | THINGS | ROUTING PROTOCOL | COMPUTER SCIENCE, THEORY & METHODS | TRUST
Journal Article
2018, 1, CRC series in security, privacy and trust, ISBN 1315305836, xiv, 544 pages
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks,...
Security measures | Mobile communication systems | Intrusion detection systems (Computer security) | Internet & Multimedia | Telecommunications | IT Security
Security measures | Mobile communication systems | Intrusion detection systems (Computer security) | Internet & Multimedia | Telecommunications | IT Security
Book
International Journal of Pure and Applied Mathematics, ISSN 1311-8080, 2017, Volume 116, Issue 23, pp. 399 - 403
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 04/2014, Volume 46, Issue 4, pp. 1 - 29
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in...
Cyber-physical systems | security | intrusion detection | classification | Security | Intrusion detection | Classification | PERFORMANCE ANALYSIS | MANAGEMENT | COMPUTER SCIENCE, THEORY & METHODS | ALGORITHMS | Surveys | Drone aircraft | Security software | Vehicles, Remotely piloted | Methods | Detectors
Cyber-physical systems | security | intrusion detection | classification | Security | Intrusion detection | Classification | PERFORMANCE ANALYSIS | MANAGEMENT | COMPUTER SCIENCE, THEORY & METHODS | ALGORITHMS | Surveys | Drone aircraft | Security software | Vehicles, Remotely piloted | Methods | Detectors
Journal Article
Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, ISSN 1543-7221, 10/2011, pp. 15 - 26
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis...
crowdsourcing | data mining | smartphone security | malware detection | anomaly detection | dynamic analysis | intrusion detection
crowdsourcing | data mining | smartphone security | malware detection | anomaly detection | dynamic analysis | intrusion detection
Conference Proceeding
ACM Transactions on Modeling and Computer Simulation (TOMACS), ISSN 1049-3301, 11/2019, Volume 29, Issue 4, pp. 1 - 25
The risk posed by insider threats has usually been approached by analyzing the behavior of users solely in the cyber domain. In this article, we show the...
physical movement | intrusion detection | Railway transportation system
physical movement | intrusion detection | Railway transportation system
Journal Article
Optics Express, ISSN 1094-4087, 04/2014, Volume 22, Issue 8, pp. 8823 - 8830
We describe a dynamic Optical Frequency Domain Reflectometry (OFDR) system which enables real time, long range, acoustic sensing at high sampling rate. The...
INTRUSION DETECTION | SYSTEM | OFDR | OPTICS | PHASE-OTDR | SPATIAL-RESOLUTION
INTRUSION DETECTION | SYSTEM | OFDR | OPTICS | PHASE-OTDR | SPATIAL-RESOLUTION
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 11/2019, pp. 1 - 1
Controller area network with flexible data rate (CAN-FD) is a widely used communication protocol for in-vehicle sensing and control. However, due to the lack...
in-vehicle networks | CAN-FD protocol | Intrusion detection | topology verification
in-vehicle networks | CAN-FD protocol | Intrusion detection | topology verification
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2015, Volume 17, Issue 3, pp. 1294 - 1312
The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating...
End-to-end security | Protocols | Internet of Things | Security | RPL | IEEE 802.15 Standards | DTLS | IEEE 802.15.4 | 6LoWPAN | Internet | Sensors | CoAP | Cryptography | Internet of things | security | WIRELESS | end-to-end security | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | INTRUSION DETECTION SYSTEMS | Economics | Platforms | Strategy | Detection | Protocol (computers) | Computer information security
End-to-end security | Protocols | Internet of Things | Security | RPL | IEEE 802.15 Standards | DTLS | IEEE 802.15.4 | 6LoWPAN | Internet | Sensors | CoAP | Cryptography | Internet of things | security | WIRELESS | end-to-end security | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | INTRUSION DETECTION SYSTEMS | Economics | Platforms | Strategy | Detection | Protocol (computers) | Computer information security
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 11/2016, Volume 75, pp. 58 - 76
Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for...
Malware | Mobile malware | Bibliometric analysis | Malware analysis | Intrusion detection system
Malware | Mobile malware | Bibliometric analysis | Malware analysis | Intrusion detection system
Journal Article
Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, 10/2005, pp. 16 - 23
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become...
security | intrusion detection | wireless sensor networks | Security | Wireless Sensor Networks | Intrusion detection
security | intrusion detection | wireless sensor networks | Security | Wireless Sensor Networks | Intrusion detection
Conference Proceeding
No results were found for your search.
Cannot display more than 1000 results, please narrow the terms of your search.