Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Intrusion detection"

ADD TO MY LIST
 
Mobile Agents in Intrusion Detection System: Review and Analysis

Author(s): Kamaruzaman Maskat | Mohd Afizi Mohd Shukran | Mohammad Adib Khairuddin | Mohd Rizal Mohd Isa
Effectiveness of Security Tools to Anomalies on Tunneled Traffic

Author(s): Nazrulazhar Bahaman | Anton Satria Prabuwono | Mohd Zaki Mas`ud | Mohd Faizal Abdollah
Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Setting a Worm Attack Warning by using Machine Learning to Classify NetFlow Data

Author(s): Shubair A. Abdulla | Sureswara Ramadass | Altyeb Altaher | Amer Al Nassiri
Intrusion Detection Model based on Differential Evolution

Author(s): M. Sailaja | R. Kiran Kumar | P. Sita Rama Murty
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
Q-ROUTING AND INTRUSION DETECTION

Author(s): D.B. Ojha
Intrusion Detection Systems in Wireless Sensor Networks

Author(s): Vijay Kumar Mallarapu | K.V.D.Sagar
Online Intrusion Alert Based on Aggregation and Correlation

Author(s): Kunchakarra Anusha1 | K.V.D.Sagar2
An Effective Genetic Algorithm for Outlier Detection

Author(s): P.Vishnu Raja | Dr.V.Murali Bhaskaran
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection

Author(s): G. Sunil Kumar | C.V.K Sirisha | Kanaka Durga.R | A.Devi
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK

Author(s): N.Ugtakhbayar | D.Battulga | Sh.Sodbileg
Hydroacoustic Monitoring of Oceanic Spreading Centers: Past, Present, and Future

Author(s): Robert P. Dziak | DelWayne R. Bohnenstiehl | Deborah K. Smith
SECURING WMN USING HONEYPOT TECHNIQUE

Author(s): Priyanka Gupta | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

Author(s): Masashi Tsuji | Yoshiaki Nemoto | Yuji Waizumi | Hiroshi Tsunoda
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
An Improved Approach for Signature and Anomaly based Intrusion Detection and Prevention

Author(s): Shivarkar Sandip A. | Muzumdar Ajit A. | Dange Bapusaheb J.
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Testing Of Network Intrusion Detection System

Author(s): B.S.Chaitanya Vamsee Pavan | M.Nalini Sri | Jagadeep Vegunta
Security Conformance for the Dynamically Routed Data

Author(s): Suma Patra | Dr.V.Janaki | Priyanka suram | Nalubala Ranjeeth Kumar
A Review of Clustering Techniques Based on Machine learning Approach in Intrusion Detection Systems

Author(s): Ala' Yaseen Ibrahim Shakhatreh | Kamalrulnizam Abu Bakar
Data Visualization Technique Framework for Intrusion detection

Author(s): Alaa El - Din Riad | Ibrahim Elhenawy | Ahmed Hassan | Nancy Awadallah
Host-based Web Anomaly Intrusion Detection System, an Artificial Immune System Approach

Author(s): Iman Khalkhali | Reza Azmi | Mozhgan Azimpour-Kivi | Mohammad Khansari
Detecting Malicious Activities in ZigBee Networks using Cognitive Radio

Author(s): Tulin Mangir | Lelass Sarakbi | Lelass Sarakbi
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

Author(s): Novarun Deb | Manali Chakraborty | Nabendu Chaki
Statistical Quality Control Approaches to Network Intrusion Detection

Author(s): Rohitha Goonatilake | Rafic Bachnak | Susantha Herath
Hierarchial key management scheme in mobile ad hoc networks

Author(s): M.Poongodi | L.Manjula | S.Pradeepkumar
An Immune Inspired Multilayer IDS

Author(s): Mafaz Muhsin Khalil Alanezi | Najlaa Badie Aldabagh
A Model for Intrusion Detection Based on Undefined Distance

Author(s): Ram Kumar | Sarvesh Kumar | Kolte V.S
Anomalous Network Packet Detection Using Data Stream Mining

Author(s): Zachary Miller | William Deitrick | Wei Hu
Tanimoto Based Similarity Measure for Intrusion Detection System

Author(s): Alok Sharma | Sunil Pranit Lal
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol

Author(s): Soojin Lee | Yunho Lee | Sang-Guun Yoo
-Net Approach to Sensor -Coverage

Author(s): Fusco Giordano | Gupta Himanshu
Dynamic Modeling of Internet Traffic for Intrusion Detection

Author(s): Shah Khushboo | Jonckheere Edmond | Bohacek Stephan
Classification of Artificial Intelligence IDS

Author(s): N.Ugtakhbayar | Sh.Sodbileg
Efficient FSM Techniques for IDS to Reduce the System Attacks

Author(s): M. Sadiq Ali Khan | S.M. Aqil Burney
Network Intrusion Detection using Clustering: A Data Mining Approach

Author(s): S.Sathya Bama | M.S.Irfan Ahmed | A. Saravanan
Multi-Layer Bayesian Based Intrusion Detection System

Author(s): Hesham Altwaijry | Saeed Algarny
MINIMIZE THE FALSE POSITIVE RATE IN A DATABASE INTRUSION DETECTION SYSTEM

Author(s): A. Rezk | H. Ali | M. El-Mikkawy | S. Barakat
An Architecture for Intrusion Detection Based on an Extension of the Method of Remaining Elements

Author(s): P. Velarde-Alvarado | C. Vargas-Rosales | D. Torres-Roman | A. Martinez-Herrera
A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM

Author(s): Ghanshyam Prasad Dubey | Neetesh Gupta | Rakesh K Bhujade
To Reduce the False Alarm in Intrusion Detection System using self Organizing Map

Author(s): Ritu Ranjani Singh | Neetesh Gupta | Shiv Kumar
Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

Author(s): Maha Abdelhaq | Rosilah Hassan | Mahamod Ismail | Daud Israf
A Data-Fusion-Based Method for Intrusion Detection System in Networks

Author(s): Xiaofeng Zhao | Hua Jiang | LiYan Jiao
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

Author(s): Chintan Bhatt | Asha Koshti | Hemant Agrawal | Zakiya Malek | Bhushan Trivedi
Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

Author(s): Hamed Jalali Qomi | Mohammad Hesam Tadayon
Guest Editorial

Author(s): Himanshu Aggarwal | Vishal Goyal
Recovery Based Architecture to Protect Hids Log Files using Time Stamps

Author(s): Surinder Singh Khurana | Divya Bansal | Sanjeev Sofat
Guest Editorial

Author(s): Mohammad Al-Rousan | Wei Li | Ahmed Al-Dubai
Guest Editorial

Author(s): Karthikeyan Subramainan
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System

Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
Realtime Encrypted Traffic Identification using Machine Learning

Author(s): Chengjie Gu | Shunyi Zhang | Yanfei Sun
Substantiating Anomalies In Wireless Networks Using Group Outlier Scores

Author(s): Elankayer Sithirasenan | Vallipuram Muthukkumarasamy
Multilevel Network Security Monitoring and Evaluation Model

Author(s): jin yang | Tang Liu | Ling xi Peng | Xue Jun Li | Gang Luo
A Survey of Game Theory in Wireless Sensor Networks Security

Author(s): Shigen Shen | Guangxue Yue | Qiying Cao | Fei Yu
A New Semi-unsupervised Intrusion Detection Method Based on Improved DBSCAN

Author(s): Xue-yong Li | Guo-hong Gao | Jia-xia Sun
Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy SVM

Author(s): Guiling Zhang | Yongzhen Ke | Zhichao Li | Mingjie E
Guest Editorial

Author(s): Dan Zhang | Bale Reddy
A Study of Intrusion Detection in Data Mining

Author(s): E.Kesavulu Reddy | V.Naveen Reddy | P.Govinda Rajulu
Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro

Author(s): Sang-Guun Yoo | Soojin Lee | Yunho Lee | Yeong-Kyu Yang | Juho Kim
Network Security

Author(s): Rahul Pareek
Q-ROUTING AND INTRUSION DETECTION

Author(s): D.B. Ojha
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
MADSN: Mobile Agent Based Detection of Selfish Node in MANET

Author(s): Debdutta Barman Roy | Rituparna Chaki
A Review of Anomaly based Intrusion Detection Systems

Author(s): V. Jyothsna | V. V. Rama Prasad | K. Munivara Prasad
Grayhole Attack and Prevention in Mobile Adhoc Network

Author(s): Megha Arya | Yogendra Kumar Jain
Network Intrusion Detection using Support Vector Regression

Author(s): Govindarajan Muthukumarasamy
Clustering of Concept Drift Categorical Data using POur-NIR Method

Author(s): N. Sudhakar Reddy | K.V.N. Sunitha
NIDS For Unsupervised Authentication Records of KDD Dataset in MATLAB

Author(s): Mis. Bhawana Pillai | Mr. Uday Pratap Singh
A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

Author(s): Atul Patel | Ruchi Kansara | Dr. Paresh Virparia
A Novel Approach for Intrusion Detection

Author(s): Vikram Chopra | Sunil Saini | Amit Kumar Choudhary


Author(s): T. V.P. Sundararajan | A. Shanmugam
Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs

Author(s): D.Srinivasa Rao | T. Pandurang Vital | T.V.S. Sriram
An Ensemble Approach to Classifier Construction based on Bootstrap Aggregation

Author(s): Dewan Md. Farid | Mohammad Zahidur Rahman | Chowdhury Mofizur Rahman
A Novel Header Matching Algorithm For Intrusion Detection Systems

Author(s): Mohammad A. Alia | Adnan A. Hnaif | Hayam K. Al-Anie | Khulood Abu Maria | Ahmed M. Manasrah | M. Imran Sarwar
Towards Automated Intrusion Response: A PAMP - Based Approach

Author(s): Rimiru Richard M | Guanzheng Tan | Njuki S. N.
Remote sensing of aerosols over snow using infrared AATSR observations

Author(s): L. G. Istomina | W. von Hoyningen-Huene | A. A. Kokhanovsky | E. Schultz | J. P. Burrows
A Novel Routing Algorithm for Vehicular Sensor Networks

Author(s): Mohammad Jalil Piran | Garimella Rama Murthy
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment

Author(s): Nan Li | Chunhe Xia | Yi Yang | HaiQuan Wang
Hybrid Key Duplication Hashing Techniques for IP Address Lookup

Author(s): Rujiroj Tiengtavat | Wei-Ming Lin
Research on Access Network Intrusion Detection System Based on DMT Technology

Author(s): Lingxi Wu | Jie Zhan | Qiange He | Shuiyan He
A Network Intrusion Detection Model Based on Immune Multi-Agent

Author(s): Nian LIU | Sunjun LIU | Rui LI | Yong LIU
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems

Author(s): Indraneel Mukhopadhyay | Mohuya Chakraborty | Satyajit Chakrabarti
Why do you need a reservation system?      Save time & money - Smart Internet Solutions