X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (12406) 12406
Journal Article (11558) 11558
Newspaper Article (1934) 1934
Dissertation (486) 486
Book Chapter (480) 480
Magazine Article (411) 411
Government Document (389) 389
Trade Publication Article (244) 244
Book / eBook (121) 121
Book Review (75) 75
Web Resource (18) 18
Publication (9) 9
Standard (7) 7
Newsletter (2) 2
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
intrusion detection (15017) 15017
intrusion (5818) 5818
intrusion detection systems (4206) 4206
computer security (2770) 2770
network security (2738) 2738
intrusion detection system (2616) 2616
security (2402) 2402
computer information security (2379) 2379
networks (2199) 2199
algorithms (2054) 2054
computer science (2007) 2007
computer networks (1804) 1804
data mining (1795) 1795
monitoring (1738) 1738
computer science, information systems (1650) 1650
machine learning (1568) 1568
engineering, electrical & electronic (1468) 1468
anomaly detection (1447) 1447
internet (1401) 1401
ids (1386) 1386
telecommunications (1371) 1371
information security (1354) 1354
data security (1326) 1326
analysis (1180) 1180
telecommunication traffic (1118) 1118
detectors (1101) 1101
protocols (1007) 1007
wireless sensor networks (998) 998
classification (993) 993
feature extraction (981) 981
protection (979) 979
neural networks (962) 962
training (906) 906
support vector machines (903) 903
wireless networks (902) 902
mathematical models (854) 854
sensors (838) 838
security software (824) 824
ip networks (796) 796
computer simulation (787) 787
computer crime (771) 771
artificial intelligence (770) 770
studies (724) 724
cloud computing (695) 695
testing (672) 672
computer science, theory & methods (643) 643
optimization (631) 631
security management (629) 629
computer architecture (606) 606
ad hoc networks (600) 600
algorithm design and analysis (596) 596
clustering (588) 588
accuracy (573) 573
software (563) 563
anomalies (561) 561
computer science, artificial intelligence (561) 561
pattern matching (558) 558
methods (557) 557
hardware (553) 553
malware (546) 546
servers (546) 546
network intrusion detection (521) 521
clustering algorithms (518) 518
computers (518) 518
conferences (517) 517
routing (506) 506
computer science, hardware & architecture (501) 501
diebstahlsicherung (484) 484
classification algorithms (483) 483
application software (474) 474
research (472) 472
humans (469) 469
authentication (468) 468
computer science, software engineering (467) 467
cryptography (467) 467
data encryption (463) 463
inventors (463) 463
access control (460) 460
genetic algorithms (457) 457
information technology (455) 455
control systems (454) 454
feature selection (450) 450
information systems (438) 438
support vector machine (436) 436
artificial neural networks (426) 426
educational institutions (424) 424
internet of things (420) 420
communication system security (418) 418
operating systems (418) 418
denial of service attacks (412) 412
computer communication networks (408) 408
computational modeling (406) 406
geosciences, multidisciplinary (406) 406
mobile ad hoc networks (403) 403
laboratories (397) 397
firewalls (394) 394
earth sciences (393) 393
computer programs (387) 387
geology (387) 387
costs (379) 379
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (26875) 26875
Chinese (1021) 1021
Japanese (146) 146
Korean (90) 90
Portuguese (38) 38
Spanish (24) 24
French (17) 17
Turkish (16) 16
German (14) 14
Russian (5) 5
Latvian (3) 3
Arabic (2) 2
Czech (2) 2
Indonesian (2) 2
Lithuanian (2) 2
Polish (2) 2
Italian (1) 1
Persian (1) 1
Slovak (1) 1
Swedish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2009, Volume 41, Issue 3, pp. 1 - 58
Anomaly detection is an important problem that has been researched within diverse research areas and application domains... 
outlier detection | Anomaly detection | Outlier detection | SYSTEM | DISTANCE-BASED OUTLIERS | NOVELTY DETECTION | DENSITY-ESTIMATION | CLASSIFICATION | SELF | Algorithms | UNSUPERVISED OUTLIER DETECTION | INTRUSION-DETECTION | TIME-SERIES | NEURAL-NETWORK | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
IEEE Communications surveys and tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 303 - 336
Journal Article
2014, ISBN 9781466582088, xxv, 340
"This book discusses detection of anomalies in computer networks from a machine learning perspective... 
COMPUTERS / Machine Theory | Machine learning | COMPUTERS / Security / Cryptography | COMPUTERS / Security / General | Computer networks | Security measures | Intrusion detection systems (Computer security)
Book
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2015, Volume 48, Issue 1, pp. 1 - 41
Journal Article
Journal of network and computer applications, ISSN 1084-8045, 2016, Volume 60, pp. 19 - 31
Journal Article
Journal of network and computer applications, ISSN 1084-8045, 2013, Volume 36, Issue 1, pp. 16 - 24
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2015, Volume 47, Issue 4, pp. 1 - 33
Journal Article
Journal Article
Expert systems with applications, ISSN 0957-4174, 2009, Volume 36, Issue 10, pp. 11994 - 12000
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks... 
Hybrid classifiers | Intrusion detection | Ensemble classifiers | Machine learning | CLASSIFIER | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | ALGORITHM | IDS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC | Security software | Detectors
Journal Article
IEEE Communications surveys and tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 266 - 282
...) and/or information destination (i.e., data sink or base station). In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed... 
Wireless sensor networks | mobile ad hoc network | MANET | security | WSN | Mobile agents | Unified modeling language | Intrusion detection | wireless sensor network | IDS | Ad hoc networks | Monitoring | intrusion detection | COMPUTER SCIENCE, INFORMATION SYSTEMS | MOBILE AD HOC | TELECOMMUNICATIONS | Remote sensors | Networks | Intrusion | Wireless networks | Switching theory | Sensors | Computer information security
Journal Article