Search Results - computer based intrusion
Search alternatives:
- based intrusion »
- computer based »
-
1
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
Published 2018“…This paper includes an overview of the intrusion-detection system and introduces to the reader some fundamental concepts of IDS work in cloud computing, also propose a new algorithm Fast Learning Network to work based on an intrusion detection.…”
Get full text
Get full text
Get full text
Article -
2
Analysis of an intrusion detection system based on immunilogy
Published 2008Get full text
Get full text
Thesis -
3
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
Get full text
Get full text
Conference or Workshop Item -
4
Anomaly-based intrusion detection using fuzzy rough clustering
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
Published 2004“…This is because those organizations are exposed to intruders. Intrusion Detection Systems (IDS) are software or hardware systems that automate the process of monitoring intrusion events that occur in a computer system or network, and analyze them for signs of intrusions. …”
Get full text
Get full text
Thesis -
6
-
7
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The current results represent a feasible outcome for a good intrusion detection and prevention framework for DDoS-cloud computing systems based on statistics and predicted techniques. …”
Get full text
Get full text
Get full text
Book Chapter -
8
DYNAMIC ANT COLONY SYSTEM WITH THREE LEVEL UPDATE FEATURE SELECTION FOR INTRUSION DETECTION
Published 2017“…Different detection methods have been used in these systems including Signature-based and Anomaly-based. The signature-based detection method is good to detect known attacks but it cannot detect novel attacks, as it only looks for signatures in the data which are fed in its knowledge base. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…Intrusion attacks remain a persistent threat in computer networks, occurring unpredictably across various geographic locations. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS)
Published 2015“…In this proposed project we will be making a comparative study of Signature-based and Anomaly-based IDS in order to select suitable comparison parameters between different approach in network intrusion detection, to evaluate suitable software/system for deploying Signature-based and Anomaly-based detection and to conduct experimental study to evaluate the differences in selected parameters in different approach in network intrusion detection. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
Published 2019“…However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
14
-
15
-
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…vii Intrusions on computer network systems are major security issues these days. …”
Get full text
Get full text
Thesis -
17
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. …”
Get full text
Get full text
Thesis -
18
The architecture of saaids: Secured autonomous agent-Based intrusion detection system
Published 2024Subjects:Conference Paper -
19
Improved hybrid intelligent intrusion detection system using AI technique
Published 2007Get full text
Article -
20
Flow-based approach on bro intrusion detection
Published 2017Get full text
Get full text
Get full text
Article
