Search

Showing total 920 results

Search Constraints

Start Over You searched for: Topic host-based intrusion detection system Remove constraint Topic: host-based intrusion detection system
920 results

Search Results

1. Survey paper on intrusion detection techniques

3. Hypervisor Based IDS Solution Approach Using Hybrid Anomaly Detection Model in Cloud Computing Environment

4. Multiclass cyber-attack classification approach based on the Krill Herd Optimized Deep Neural Network (KH-DNN) model for WSN.

5. A host-based anomaly detection approach by representing system calls as states of kernel modules.

6. A High-Performance Deep Learning Architecture for Host-based Intrusion Detection System

7. A Novel Mechanism for Host-Based Intrusion Detection System

8. Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network

9. Spoofed ARP Packets Detection in Switched LAN Networks

10. Cooperative Intrusion Detection Model Based on State Transition Analysis

11. A Novel Optimization Algorithm Based on Stinging Behavior of Bee

12. Design and Implementation of a Host-Based Intrusion Detection System for Linux-Based Web Server

13. A transparent and scalable anomaly-based DoS detection method

14. A risk mitigation approach for autonomous cloud intrusion response system

15. Anomaly based IDS using Backpropagation Neural Network

16. The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology

17. An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment

18. Research on Intrusion Detection Method of Web Service Composition

19. High Performance Network Security Using NIDS Approach

20. Layered Approach for Preprocessing of Data in Intrusion Prevention Systems

21. Enhanced Intrusion Tolerant System for Mobile Payment

22. Based on the Function Analysis of Integrated Intrusion Detection System for Network Security

23. Intrusion Detection System using Hidden Markov Model (HMM)

24. Towards ad-hoc cloud based approach for mobile intrusion detection

25. Intrusion Detection Using a Multiple-Detector Set Artificial Immune System

26. Research of Network Intrusion Detection System based on Machine Learning and Rough Set Theory

27. Intrusion detection system in wireless sensor networks: A comprehensive review

28. Anomaly-based NIDS: A review of machine learning methods on malware detection

29. An Improved Hybrid Intrusion Detection System in Cloud Computing

30. Divided two-part adaptive intrusion detection system

31. Role of Cross Layer Based Intrusion Detection System for Wireless Domain

32. Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS/IPS) design for an IP networks

33. Smart Grid DNP3 Vulnerability Analysis and Experimentation

34. Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

35. Virtual machine monitor-based lightweight intrusion detection

36. Network Intrusion Detection System Embedded on a Smart Sensor

37. Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable

38. Research on Network Intrusion Detection System

39. An Intrusion Detection System for IEC61850 Automated Substations

40. An Overview of IP Flow-Based Intrusion Detection

41. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

42. A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems

43. Design and development of a prototype application for intrusion detection using data mining

44. Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks

45. A scalable intrusion detection system for IPv6

46. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art

47. Modified Apriori Approach for Evade Network Intrusion Detection System

48. Intrusion Detection

49. A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications

50. Specifying and using intrusion masking models to process distributed operations