X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (10902) 10902
Conference Proceeding (10021) 10021
Newspaper Article (1684) 1684
Publication (600) 600
Trade Publication Article (479) 479
Book Chapter (459) 459
Dissertation (442) 442
Government Document (335) 335
Magazine Article (292) 292
Book / eBook (124) 124
Book Review (102) 102
Web Resource (17) 17
Paper (8) 8
Reference (8) 8
Standard (6) 6
Technical Report (4) 4
Data Set (2) 2
Report (2) 2
Newsletter (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
intrusion detection (11271) 11271
intrusion (5349) 5349
intrusion detection systems (4041) 4041
computer security (2512) 2512
intrusion detection system (2477) 2477
network security (2414) 2414
computer information security (2326) 2326
networks (2126) 2126
security (2050) 2050
algorithms (1885) 1885
computer science (1728) 1728
computer networks (1528) 1528
computer science, information systems (1514) 1514
data mining (1484) 1484
monitoring (1477) 1477
ids (1275) 1275
internet (1220) 1220
engineering, electrical & electronic (1212) 1212
machine learning (1197) 1197
anomaly detection (1176) 1176
telecommunications (1176) 1176
data security (1160) 1160
information security (1114) 1114
analysis (1092) 1092
detectors (1020) 1020
telecommunication traffic (908) 908
classification (860) 860
protection (857) 857
protocols (824) 824
mathematical models (819) 819
wireless networks (814) 814
neural networks (808) 808
security software (793) 793
wireless sensor networks (781) 781
training (740) 740
feature extraction (738) 738
sensors (737) 737
computer simulation (729) 729
support vector machines (719) 719
artificial intelligence (698) 698
studies (698) 698
databases (685) 685
ip networks (643) 643
computer crime (637) 637
cloud computing (601) 601
security management (587) 587
computer science, theory & methods (580) 580
optimization (541) 541
computer architecture (529) 529
methods (521) 521
software (517) 517
testing (515) 515
ad hoc networks (514) 514
anomalies (514) 514
computer science, artificial intelligence (509) 509
accuracy (504) 504
servers (498) 498
hardware (483) 483
computers (479) 479
malware (476) 476
clustering (475) 475
pattern matching (472) 472
computer science, hardware & architecture (467) 467
conferences (459) 459
control systems (452) 452
algorithm design and analysis (451) 451
data encryption (451) 451
inventors (447) 447
computer science, software engineering (440) 440
information systems (438) 438
research (425) 425
operating systems (421) 421
diebstahlsicherung (417) 417
communication system security (409) 409
routing (408) 408
access control (407) 407
computer communication networks (400) 400
genetic algorithms (390) 390
denial of service attacks (387) 387
information technology (382) 382
cryptography (379) 379
authentication (378) 378
humans (376) 376
application software (375) 375
computer programs (375) 375
classification algorithms (372) 372
network intrusion detection (372) 372
clustering algorithms (370) 370
firewalls (369) 369
earth sciences (367) 367
engineering (364) 364
geosciences, multidisciplinary (352) 352
usage (350) 350
geology (349) 349
artificial neural networks (341) 341
feature selection (341) 341
immune system (335) 335
eindringentdeckung (334) 334
mathematical analysis (334) 334
traffic flow (333) 333
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (21) 21
Engineering & Comp. Sci. - Stacks (16) 16
Earth Sciences (Noranda) - Stacks (8) 8
UTL at Downsview - May be requested (7) 7
UofT at Mississauga - Stacks (6) 6
Collection Dvlpm't (Acquisitions) - Vendor file (4) 4
Gerstein Science - Stacks (3) 3
Robarts - Stacks (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Law (Bora Laskin) - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (22044) 22044
Chinese (931) 931
Japanese (133) 133
Korean (76) 76
Portuguese (36) 36
French (15) 15
German (11) 11
Spanish (10) 10
Turkish (10) 10
Russian (5) 5
Latvian (3) 3
Arabic (2) 2
Czech (2) 2
Lithuanian (2) 2
Polish (2) 2
Indonesian (1) 1
Italian (1) 1
Persian (1) 1
Slovak (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2014, ISBN 9781466582088, xxv, 340
"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and... 
COMPUTERS / Machine Theory | Machine learning | COMPUTERS / Security / Cryptography | COMPUTERS / Security / General | Computer networks | Security measures | Intrusion detection systems (Computer security)
Book
2018, 1, CRC series in security, privacy and trust, ISBN 1315305836, xiv, 544 pages
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks,... 
Security measures | Mobile communication systems | Intrusion detection systems (Computer security) | Internet & Multimedia | Telecommunications | IT Security
Book
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 303 - 336
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2009, Volume 41, Issue 3, pp. 1 - 58
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques... 
outlier detection | Anomaly detection | Outlier detection | SYSTEM | DISTANCE-BASED OUTLIERS | NOVELTY DETECTION | DENSITY-ESTIMATION | CLASSIFICATION | SELF | Algorithms | UNSUPERVISED OUTLIER DETECTION | INTRUSION-DETECTION | TIME-SERIES | NEURAL-NETWORK | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 01/2013, Volume 36, Issue 1, pp. 16 - 24
With the increasing amount of network throughput and security threat, the study of intrusion detection systems (IDSs) has received a lot of attention... 
Misuse | Intrusion detection | Anomaly | SNORT | SERVICE ATTACKS | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | MECHANISM | PERFORMANCE | NETWORKS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | TAXONOMY | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | ANOMALY DETECTION | Computer science | Security software | Detectors
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2015, Volume 48, Issue 1, pp. 1 - 41
The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we... 
measurement methodology | metrics | workload generation | Computer intrusion detection systems | Workload generation | Metrics | Measurement methodology | COMPUTER SCIENCE, THEORY & METHODS | NIDS | Surveys | Evaluation | Security software | Detectors | Design engineering | Intrusion | Methodology | Computation | Surveying | Computer information security | Workload
Journal Article
Information Sciences, ISSN 0020-0255, 02/2017, Volume 378, pp. 484 - 497
Journal Article
Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, ISSN 1543-7221, 10/2011, pp. 15 - 26
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis... 
crowdsourcing | data mining | smartphone security | malware detection | anomaly detection | dynamic analysis | intrusion detection
Conference Proceeding
Expert Systems With Applications, ISSN 0957-4174, 2005, Volume 29, Issue 4, pp. 713 - 722
Journal Article
Applied Soft Computing Journal, ISSN 1568-4946, 2011, Volume 11, Issue 7, pp. 4349 - 4365
As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by... 
Computational intelligence approaches | Alert correlation | False positive analysis | Collaborative intrusion detection | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | MODEL | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Surveys | Computer science | Security software | Algorithms | Security systems | Detectors | Universities and colleges
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 01/2019, Volume 51, Issue 5, pp. 1 - 36
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 266 - 282
Journal Article
2011, ISBN 9781891121005, x, 358
This book covers all aspects of foliage penetration (FOPEN) radar, concentrating on both airborne military radar systems as well as earth resource mapping... 
Ground penetrating radar | Electronics & communications engineering | Forest canopies | Aerial observation (Military science), Earth (Planet) -- Surface -- Remote sensing | Earth -- Surface -- Remote sensing | Aerial observation (Military science)
Book
Expert Systems With Applications, ISSN 0957-4174, 09/2019, Volume 130, pp. 79 - 83
•Test dataset can never be modified.•Optimal Training dataset composition for detection of minority classes.•Feature selection without under-sampling performs... 
Training-Test dataset composition | Feature selection | Intrusion Detection System (IDS) | Security software | Algorithms | Detectors | Datasets | Performance evaluation | Training | Intrusion | Classifiers | Data sets | Classification | Oversampling | Bayesian analysis | Expert systems | Intrusion detection systems
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 04/2014, Volume 46, Issue 4, pp. 1 - 29
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in... 
Cyber-physical systems | security | intrusion detection | classification | Security | Intrusion detection | Classification | PERFORMANCE ANALYSIS | MANAGEMENT | COMPUTER SCIENCE, THEORY & METHODS | ALGORITHMS | Surveys | Drone aircraft | Security software | Vehicles, Remotely piloted | Methods | Detectors
Journal Article
2018, Springer briefs on cyber security systems and networks, ISBN 9789811314438, 92
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. 
Computer science | Data mining | Computer security | Machine learning | Systems and Data Security | Wireless and Mobile Communication | Computer Science | Data Mining and Knowledge Discovery | Artificial Intelligence (incl. Robotics) | Big Data | Security
eBook
Expert Systems With Applications, ISSN 0957-4174, 12/2012, Volume 39, Issue 18, pp. 13492 - 13500
Journal Article