Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Intrusion detection system"

ADD TO MY LIST
 
A Coalgebra as an Intrusion Detection System

Author(s): Daniel Mihályi | Valerie Novitzká
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

Author(s): SUNIL K. PARYANI, | RAJESH PATEL, | VIJAY UKANI
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification

Author(s): Ferdous A Barbhuiya | Santosh Biswas | Sukumar Nandi
Software based Low Rate DoS Attack Detection Mechanism

Author(s): Rejo Mathew | Vijay Katkar
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures

Author(s): Ms. Preetee K. Karmore, | Ms. Sonali T. Bodkhe
Fuzzy K-mean Clustering Via Random Forest For Intrusiion Detection System

Author(s): Kusum bharti | Shweta Jain, | Sanyam Shukla
An Implementation Approach for Intrusion Detection System in Wireless sensor Network

Author(s): Ruchi Bhatnagar | Dr. A.K. Srivastava | Anupriya Sharma
QAIDS: Quantitative and Agent based Intrusion Detection System

Author(s): Mojtaba Karami | Marjan Kuchaki Rafsanjani | Amir Hosein Fathi Navid | Yaeghoob Yavari
INTRUSION DETECTION THROUGH HONEY POTS

Author(s): JAMMI ASHOK | Y.RAJU, | S.MUNISHANKARAIAH
A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection

Author(s): Z. Muda | W. Yassin | M.N. Sulaiman | N.I. Udzir
Honeypot based Secure Network System

Author(s): Yogendra Kumar Jain | Surabhi Singh
A HYBRID INTRUSION PREVENTION SYSTEM (HIPS) FOR WEB DATABASE SECURITY

Author(s): Eslam Mohsin Hassib | Aida Osman AbdElgwad | Ahmed Ibrahim Saleh
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System

Author(s): Renuka Prasad.B | Annamma Abraham | Abhas Abhinav | Sunil.V.Gurlahosur | Srinivasa Y
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC

Author(s): R. Shanmugavadivu | Dr.N.Nagarajan
Unleashing Power of Artificial Intelligence for Network Intrusion Detection Problem

Author(s): Gaurang Panchal, | Parth Shah, | Amit Ganatra, | Y P Kosta
A Recent Survey on Bloom Filters in Network Intrusion Detection Systems

Author(s): K.Saravanan, | Dr.A.Senthil kumar | J.S.Dolian
Intelligent Network Intrusion Detection Using DT and BN Classification Techniques

Author(s): P. Srinivasulu | R. Satya Prasad | I. Ramesh Babu
An Efficient Hybrid Honeypot Framework for Improving Network Security

Author(s): Omid Mahdi Ebadati E. | Harleen Kaur | M. Afshar Alam
Intrusion Detection System Using Intrusion Detection System Using Clustering with Reduced Features

Author(s): Murad Abdo Rassam | Mohd. Aizaini Maarof | Anazida Zainal
Hybrid Modular Approach for Anomaly Detection System

Author(s): A.Laxmi Kanth | M. Sridhar | Suresh Yadav
A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps

Author(s): Amir Azimi Alasti Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, Mir Kamal Mirnia, Mehdi Bahrbegi, Elnaz Safarzadeh & Ali Ebrahimi
DPA to Rectify Transient Faulty Nodes in Effective Manner

Author(s): P. S. Balamurugan | K.Thanushkodi
Performance Analysis of Intrusion Detection in MANET

Author(s): Rohit Sharma | SAMRIDHI SHARMA
Network Intrusion Forensic Analysis Using Intrusion Detection System

Author(s): Manish Kumar | Dr. M. Hanumanthappa | Dr. T.V. Suresh Kumar
Implementation of Direct Processor Access in Transient Faulty Nodes

Author(s): P. S. Balamurugan | K.Thanushkodi
Mobile Agents in Intrusion Detection System: Review and Analysis

Author(s): Kamaruzaman Maskat | Mohd Afizi Mohd Shukran | Mohammad Adib Khairuddin | Mohd Rizal Mohd Isa
Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Setting a Worm Attack Warning by using Machine Learning to Classify NetFlow Data

Author(s): Shubair A. Abdulla | Sureswara Ramadass | Altyeb Altaher | Amer Al Nassiri
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
Intrusion Detection Systems in Wireless Sensor Networks

Author(s): Vijay Kumar Mallarapu | K.V.D.Sagar
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

Author(s): Masashi Tsuji | Yoshiaki Nemoto | Yuji Waizumi | Hiroshi Tsunoda
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
An Improved Approach for Signature and Anomaly based Intrusion Detection and Prevention

Author(s): Shivarkar Sandip A. | Muzumdar Ajit A. | Dange Bapusaheb J.
Testing Of Network Intrusion Detection System

Author(s): B.S.Chaitanya Vamsee Pavan | M.Nalini Sri | Jagadeep Vegunta
A Review of Clustering Techniques Based on Machine learning Approach in Intrusion Detection Systems

Author(s): Ala' Yaseen Ibrahim Shakhatreh | Kamalrulnizam Abu Bakar
Data Visualization Technique Framework for Intrusion detection

Author(s): Alaa El - Din Riad | Ibrahim Elhenawy | Ahmed Hassan | Nancy Awadallah
Host-based Web Anomaly Intrusion Detection System, an Artificial Immune System Approach

Author(s): Iman Khalkhali | Reza Azmi | Mozhgan Azimpour-Kivi | Mohammad Khansari
Detecting Malicious Activities in ZigBee Networks using Cognitive Radio

Author(s): Tulin Mangir | Lelass Sarakbi | Lelass Sarakbi
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

Author(s): Novarun Deb | Manali Chakraborty | Nabendu Chaki
Statistical Quality Control Approaches to Network Intrusion Detection

Author(s): Rohitha Goonatilake | Rafic Bachnak | Susantha Herath
Hierarchial key management scheme in mobile ad hoc networks

Author(s): M.Poongodi | L.Manjula | S.Pradeepkumar
An Immune Inspired Multilayer IDS

Author(s): Mafaz Muhsin Khalil Alanezi | Najlaa Badie Aldabagh
A Model for Intrusion Detection Based on Undefined Distance

Author(s): Ram Kumar | Sarvesh Kumar | Kolte V.S
Anomalous Network Packet Detection Using Data Stream Mining

Author(s): Zachary Miller | William Deitrick | Wei Hu
Tanimoto Based Similarity Measure for Intrusion Detection System

Author(s): Alok Sharma | Sunil Pranit Lal
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol

Author(s): Soojin Lee | Yunho Lee | Sang-Guun Yoo
-Net Approach to Sensor -Coverage

Author(s): Fusco Giordano | Gupta Himanshu
Efficient FSM Techniques for IDS to Reduce the System Attacks

Author(s): M. Sadiq Ali Khan | S.M. Aqil Burney
Network Intrusion Detection using Clustering: A Data Mining Approach

Author(s): S.Sathya Bama | M.S.Irfan Ahmed | A. Saravanan
Multi-Layer Bayesian Based Intrusion Detection System

Author(s): Hesham Altwaijry | Saeed Algarny
MINIMIZE THE FALSE POSITIVE RATE IN A DATABASE INTRUSION DETECTION SYSTEM

Author(s): A. Rezk | H. Ali | M. El-Mikkawy | S. Barakat
A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM

Author(s): Ghanshyam Prasad Dubey | Neetesh Gupta | Rakesh K Bhujade
To Reduce the False Alarm in Intrusion Detection System using self Organizing Map

Author(s): Ritu Ranjani Singh | Neetesh Gupta | Shiv Kumar
Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

Author(s): Maha Abdelhaq | Rosilah Hassan | Mahamod Ismail | Daud Israf
A Data-Fusion-Based Method for Intrusion Detection System in Networks

Author(s): Xiaofeng Zhao | Hua Jiang | LiYan Jiao
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

Author(s): Chintan Bhatt | Asha Koshti | Hemant Agrawal | Zakiya Malek | Bhushan Trivedi
Recovery Based Architecture to Protect Hids Log Files using Time Stamps

Author(s): Surinder Singh Khurana | Divya Bansal | Sanjeev Sofat
Guest Editorial

Author(s): Mohammad Al-Rousan | Wei Li | Ahmed Al-Dubai
Guest Editorial

Author(s): Karthikeyan Subramainan
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System

Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
Substantiating Anomalies In Wireless Networks Using Group Outlier Scores

Author(s): Elankayer Sithirasenan | Vallipuram Muthukkumarasamy
Multilevel Network Security Monitoring and Evaluation Model

Author(s): jin yang | Tang Liu | Ling xi Peng | Xue Jun Li | Gang Luo
A Survey of Game Theory in Wireless Sensor Networks Security

Author(s): Shigen Shen | Guangxue Yue | Qiying Cao | Fei Yu
Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy SVM

Author(s): Guiling Zhang | Yongzhen Ke | Zhichao Li | Mingjie E
Guest Editorial

Author(s): Dan Zhang | Bale Reddy
Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro

Author(s): Sang-Guun Yoo | Soojin Lee | Yunho Lee | Yeong-Kyu Yang | Juho Kim
Network Security

Author(s): Rahul Pareek
Q-ROUTING AND INTRUSION DETECTION

Author(s): D.B. Ojha
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
Grayhole Attack and Prevention in Mobile Adhoc Network

Author(s): Megha Arya | Yogendra Kumar Jain
NIDS For Unsupervised Authentication Records of KDD Dataset in MATLAB

Author(s): Mis. Bhawana Pillai | Mr. Uday Pratap Singh
A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

Author(s): Atul Patel | Ruchi Kansara | Dr. Paresh Virparia
A Novel Approach for Intrusion Detection

Author(s): Vikram Chopra | Sunil Saini | Amit Kumar Choudhary
Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs

Author(s): D.Srinivasa Rao | T. Pandurang Vital | T.V.S. Sriram
A Novel Header Matching Algorithm For Intrusion Detection Systems

Author(s): Mohammad A. Alia | Adnan A. Hnaif | Hayam K. Al-Anie | Khulood Abu Maria | Ahmed M. Manasrah | M. Imran Sarwar
Towards Automated Intrusion Response: A PAMP - Based Approach

Author(s): Rimiru Richard M | Guanzheng Tan | Njuki S. N.
A Novel Routing Algorithm for Vehicular Sensor Networks

Author(s): Mohammad Jalil Piran | Garimella Rama Murthy
Hybrid Key Duplication Hashing Techniques for IP Address Lookup

Author(s): Rujiroj Tiengtavat | Wei-Ming Lin
Research on Access Network Intrusion Detection System Based on DMT Technology

Author(s): Lingxi Wu | Jie Zhan | Qiange He | Shuiyan He
A Network Intrusion Detection Model Based on Immune Multi-Agent

Author(s): Nian LIU | Sunjun LIU | Rui LI | Yong LIU
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems

Author(s): Indraneel Mukhopadhyay | Mohuya Chakraborty | Satyajit Chakrabarti
Reducing False Alerts Using Intelligent Hybrid Systems

Author(s): Sravan Kumar Jonnalagadda | Subha Sree Mallela
Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

Author(s): Vivian Ogochukwu Nwaocha | Inyiama H.C.
Hybrid Multi-level Intrusion Detection System

Author(s): Sahar Selim | Mohamed Hashem | Taymoor M. Nazmy
Intrusion Detection Methods in Wireless Network Systems

Author(s): KREKÁN Ján | DOBOŠ Lubomír | PAPAJ Ján
Save time & money - Smart Internet Solutions      Why do you need a reservation system?