X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (12757) 12757
Journal Article (12389) 12389
Newspaper Article (1734) 1734
Publication (652) 652
Book Chapter (504) 504
Dissertation (493) 493
Trade Publication Article (486) 486
Government Document (389) 389
Magazine Article (303) 303
Book / eBook (119) 119
Book Review (105) 105
Web Resource (18) 18
Paper (9) 9
Reference (8) 8
Standard (6) 6
Technical Report (4) 4
Data Set (2) 2
Newsletter (2) 2
Report (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
intrusion detection (14691) 14691
intrusion (5721) 5721
intrusion detection systems (4085) 4085
computer security (2711) 2711
network security (2682) 2682
intrusion detection system (2507) 2507
computer information security (2377) 2377
security (2326) 2326
networks (2192) 2192
computer science (1999) 1999
algorithms (1971) 1971
computer networks (1781) 1781
data mining (1768) 1768
monitoring (1702) 1702
computer science, information systems (1533) 1533
machine learning (1402) 1402
anomaly detection (1392) 1392
internet (1364) 1364
information security (1342) 1342
engineering, electrical & electronic (1336) 1336
ids (1326) 1326
data security (1319) 1319
telecommunications (1256) 1256
analysis (1153) 1153
telecommunication traffic (1103) 1103
detectors (1062) 1062
protocols (983) 983
protection (977) 977
wireless sensor networks (968) 968
classification (952) 952
neural networks (903) 903
feature extraction (883) 883
wireless networks (871) 871
training (853) 853
support vector machines (846) 846
mathematical models (845) 845
security software (804) 804
databases (800) 800
sensors (800) 800
ip networks (780) 780
computer simulation (761) 761
computer crime (754) 754
artificial intelligence (749) 749
studies (712) 712
testing (667) 667
cloud computing (663) 663
computer science, theory & methods (619) 619
ad hoc networks (600) 600
security management (599) 599
algorithm design and analysis (596) 596
optimization (591) 591
computer architecture (583) 583
clustering (575) 575
pattern matching (554) 554
accuracy (551) 551
hardware (545) 545
software (541) 541
methods (540) 540
computer science, artificial intelligence (538) 538
anomalies (535) 535
servers (531) 531
computers (521) 521
conferences (512) 512
malware (507) 507
clustering algorithms (505) 505
routing (500) 500
network intrusion detection (497) 497
computer science, hardware & architecture (480) 480
application software (472) 472
diebstahlsicherung (468) 468
humans (467) 467
research (464) 464
inventors (459) 459
authentication (458) 458
classification algorithms (458) 458
cryptography (457) 457
data encryption (456) 456
computer science, software engineering (448) 448
control systems (446) 446
access control (445) 445
information technology (444) 444
genetic algorithms (443) 443
information systems (437) 437
educational institutions (422) 422
feature selection (422) 422
support vector machine (419) 419
operating systems (417) 417
communication system security (414) 414
computer communication networks (405) 405
mobile ad hoc networks (402) 402
denial of service attacks (396) 396
artificial neural networks (395) 395
geosciences, multidisciplinary (394) 394
laboratories (392) 392
computer programs (388) 388
earth sciences (388) 388
computational modeling (387) 387
firewalls (387) 387
geology (380) 380
costs (378) 378
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (26245) 26245
Chinese (1010) 1010
Japanese (148) 148
Korean (89) 89
Portuguese (38) 38
Spanish (18) 18
French (17) 17
Turkish (16) 16
German (14) 14
Russian (5) 5
Latvian (3) 3
Arabic (2) 2
Czech (2) 2
Indonesian (2) 2
Lithuanian (2) 2
Polish (2) 2
Italian (1) 1
Persian (1) 1
Slovak (1) 1
Swedish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2014, ISBN 9781466582088, xxv, 340
"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and... 
COMPUTERS / Machine Theory | Machine learning | COMPUTERS / Security / Cryptography | COMPUTERS / Security / General | Computer networks | Security measures | Intrusion detection systems (Computer security)
Book
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2009, Volume 41, Issue 3, pp. 1 - 58
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques... 
outlier detection | Anomaly detection | Outlier detection | SYSTEM | DISTANCE-BASED OUTLIERS | NOVELTY DETECTION | DENSITY-ESTIMATION | CLASSIFICATION | SELF | Algorithms | UNSUPERVISED OUTLIER DETECTION | INTRUSION-DETECTION | TIME-SERIES | NEURAL-NETWORK | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 03/2014, Volume 41, Issue 4, pp. 1690 - 1700
Journal Article
2020, ISBN 9789811527159, 151
eBook
2011, ISBN 9781891121005, x, 358
This book covers all aspects of foliage penetration (FOPEN) radar, concentrating on both airborne military radar systems as well as earth resource mapping... 
Ground penetrating radar | Electronics & communications engineering | Forest canopies | Aerial observation (Military science), Earth (Planet) -- Surface -- Remote sensing | Earth -- Surface -- Remote sensing | Earth | Aerial observation (Military science) | Remote sensing | Surface
Book
2018, 1, CRC series in security, privacy and trust, ISBN 1315305836, xiv, 544 pages
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks,... 
Security measures | Mobile communication systems | Intrusion detection systems (Computer security) | Internet & Multimedia | Telecommunications | IT Security
Book
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 1, pp. 303 - 336
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 2005, Volume 29, Issue 4, pp. 713 - 722
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2015, Volume 48, Issue 1, pp. 1 - 41
The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we... 
measurement methodology | metrics | workload generation | Computer intrusion detection systems | Workload generation | Metrics | Measurement methodology | COMPUTER SCIENCE, THEORY & METHODS | NIDS | Surveys | Evaluation | Security software | Detectors | Design engineering | Intrusion | Methodology | Computation | Surveying | Computer information security | Workload
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 01/2016, Volume 60, pp. 19 - 31
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2015, Volume 47, Issue 4, pp. 1 - 33
The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned from facilitators to drivers; as... 
network security | classification | attacks | Collaborative intrusion detection | Network security | Attacks | Classification | SYSTEM | ALERT CORRELATION | COMPUTER SCIENCE, THEORY & METHODS | Security | TRUST | Surveys | Security software | Design and construction | Multiprocessing | Detectors
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 01/2013, Volume 36, Issue 1, pp. 16 - 24
With the increasing amount of network throughput and security threat, the study of intrusion detection systems (IDSs) has received a lot of attention... 
Misuse | Intrusion detection | Anomaly | SNORT | SERVICE ATTACKS | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | MECHANISM | PERFORMANCE | NETWORKS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | TAXONOMY | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | ANOMALY DETECTION | Computer science | Security software | Detectors
Journal Article
Applied Soft Computing Journal, ISSN 1568-4946, 2011, Volume 11, Issue 7, pp. 4349 - 4365
As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by... 
Computational intelligence approaches | Alert correlation | False positive analysis | Collaborative intrusion detection | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | MODEL | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Surveys | Computer science | Security software | Algorithms | Security systems | Detectors | Universities and colleges
Journal Article
Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, ISSN 1543-7221, 10/2011, pp. 15 - 26
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis... 
crowdsourcing | data mining | smartphone security | malware detection | anomaly detection | dynamic analysis | intrusion detection
Conference Proceeding
Computers & Security, ISSN 0167-4048, 09/2014, Volume 45, pp. 100 - 123
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party... 
Botnet detection | Malware detection | Botnet dataset | Network traffic | Anomaly detection | Methods comparison | BEHAVIOR ANALYSIS | INTRUSION-DETECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | TRUST | Computer science | Algorithms | Comparative analysis | Methods | Construction | Methodology | Error detection | Malware | Computer information security | Estimates | Empirical analysis
Journal Article