Journal articles on the topic 'Adaptive IDS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adaptive IDS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ninu, S. B., and S. Behin Sam. "Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs." i-manager's Journal on Mobile Applications and Technologies 2, no. 2 (July 15, 2015): 19–26. http://dx.doi.org/10.26634/jmt.2.2.4872.
Full textLu, Yi, Menghan Liu, Jie Zhou, and Zhigang Li. "Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network." Security and Communication Networks 2021 (July 13, 2021): 1–12. http://dx.doi.org/10.1155/2021/9938586.
Full textXue, Yu, Weiwei Jia, Xuejian Zhao, and Wei Pang. "An Evolutionary Computation Based Feature Selection Method for Intrusion Detection." Security and Communication Networks 2018 (October 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/2492956.
Full textHsu, Po-Jen, Hung-Ling Yeh, Chia-Liang Tsai, Chia-Hua Chu, Fu-Chen Chen, and Chien-Yu Pan. "Effects of a Floor Hockey Intervention on Motor Proficiency, Physical Fitness, and Adaptive Development in Youths with Mild Intellectual Disabilities." International Journal of Environmental Research and Public Health 18, no. 13 (July 1, 2021): 7059. http://dx.doi.org/10.3390/ijerph18137059.
Full textRamdane, Chikh, and Salim Chikhi. "A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System." International Journal of Information Security and Privacy 8, no. 4 (October 2014): 1–25. http://dx.doi.org/10.4018/ijisp.2014100101.
Full textKlidbary, Sajad Haghzad, Saeed Bagheri Shouraki, and Iman Esmaili Paeen Afrakoti. "An adaptive efficient memristive ink drop spread (IDS) computing system." Neural Computing and Applications 31, no. 11 (July 4, 2018): 7733–54. http://dx.doi.org/10.1007/s00521-018-3604-0.
Full textPuchalska-Wasyl, Małgorzata M., and Tomasz Jankowski. "Do Internal Dialogues in Young Adults Depend on Mother-Father Incongruence in Parental Attitudes Assessed Retrospectively?" Journal of Family Issues 41, no. 5 (October 14, 2019): 667–91. http://dx.doi.org/10.1177/0192513x19881773.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textIbrahim, Nurudeen Mahmud, and Anazida Zainal. "An Adaptive Intrusion Detection Scheme for Cloud Computing." International Journal of Swarm Intelligence Research 10, no. 4 (October 2019): 53–70. http://dx.doi.org/10.4018/ijsir.2019100104.
Full textGao, Jianlei, Senchun Chai, Baihai Zhang, and Yuanqing Xia. "Research on Network Intrusion Detection Based on Incremental Extreme Learning Machine and Adaptive Principal Component Analysis." Energies 12, no. 7 (March 29, 2019): 1223. http://dx.doi.org/10.3390/en12071223.
Full textSuresh, Chandra K. H., Sule Ozev, and Ozgur Sinanoglu. "Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation." ACM Transactions on Design Automation of Electronic Systems 20, no. 3 (June 24, 2015): 1–18. http://dx.doi.org/10.1145/2732408.
Full textGarg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.
Full textYun, Dong-Yeol, Seung-Kwon Seo, Umer Zahid, and Chul-Jin Lee. "Deep Neural Network for Automatic Image Recognition of Engineering Diagrams." Applied Sciences 10, no. 11 (June 9, 2020): 4005. http://dx.doi.org/10.3390/app10114005.
Full textYe, Ru Yi, Zhou Jiang, and Qi Wang. "Economics of Information Security Investment Integrated with IDS and Attacker’s Behavior." Applied Mechanics and Materials 631-632 (September 2014): 928–31. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.928.
Full textJOSHI, RAJANI R., and BHUVANESWARAN NATARAJAN. "PREDICTION AND ANALYSIS OF VACCINATION POSSIBILITIES IN AUTOIMMUNE DISEASES: AN APPLICATION OF ARTIFICIAL IMMUNE SYSTEM." Journal of Biological Systems 10, no. 02 (June 2002): 107–26. http://dx.doi.org/10.1142/s0218339002000536.
Full textCarbonara, Nunzia. "Competitive Success of Italian Industrial Districts: A Network-based Approach." Journal of Interdisciplinary Economics 30, no. 1 (June 26, 2017): 78–104. http://dx.doi.org/10.1177/0260107917700470.
Full textDharmarajan, R., and V. Thiagarasu. "Computation of Risk Severity of the Malicious Node using Adaptive Neuro Fuzzy Inference System (ANFIS)." Asian Journal of Engineering and Applied Technology 8, no. 1 (February 5, 2019): 9–14. http://dx.doi.org/10.51983/ajeat-2019.8.1.1067.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textSundararajan, Ranjeeth Kumar, and Umamakeswari Arumugam. "Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/203814.
Full textApiecionek, Łukasz, and Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.
Full textAlaparthy, Vishwa, and Salvatore D. Morgera. "Modeling an Intrusion Detection System Based on Adaptive Immunology." International Journal of Interdisciplinary Telecommunications and Networking 11, no. 2 (April 2019): 42–55. http://dx.doi.org/10.4018/ijitn.2019040104.
Full textBiggiero, Lucio. "Markets, hierarchies, networks, districts: A cybernetic approach." Human Systems Management 18, no. 2 (July 19, 1999): 71–86. http://dx.doi.org/10.3233/hsm-1999-18203.
Full textBudiman, Arif, Mohamad Ivan Fanany, and Chan Basaruddin. "Adaptive Online Sequential ELM for Concept Drift Tackling." Computational Intelligence and Neuroscience 2016 (2016): 1–17. http://dx.doi.org/10.1155/2016/8091267.
Full textAkremi, Aymen, Hassen Sallay, and Mohsen Rouached. "An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 62–78. http://dx.doi.org/10.4018/ijisp.2014010104.
Full textLimouchi, Elnaz, and Imad Mahgoub. "Smart Fuzzy Logic-Based Density and Distribution Adaptive Scheme for Efficient Data Dissemination in Vehicular Ad Hoc Networks." Electronics 9, no. 8 (August 12, 2020): 1297. http://dx.doi.org/10.3390/electronics9081297.
Full textNi, Tongguang, Xiaoqing Gu, Hongyuan Wang, and Yu Li. "Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis." Journal of Control Science and Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/821315.
Full textBahrpeyma, Fouad, Ali Zakerolhoseini, and Hassan Haghighi. "Using IDS fitted Q to develop a real-time adaptive controller for dynamic resource provisioning in Cloud's virtualized environment." Applied Soft Computing 26 (January 2015): 285–98. http://dx.doi.org/10.1016/j.asoc.2014.10.005.
Full textAldhaheri, Sahar, Daniyal Alghazzawi, Li Cheng, Bander Alzahrani, and Abdullah Al-Barakati. "DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System." Applied Sciences 10, no. 6 (March 11, 2020): 1909. http://dx.doi.org/10.3390/app10061909.
Full textMittal, Mohit, Rocío Pérez de Prado, Yukiko Kawai, Shinsuke Nakajima, and José E. Muñoz-Expósito. "Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks." Energies 14, no. 11 (May 27, 2021): 3125. http://dx.doi.org/10.3390/en14113125.
Full textJesudoss, Sofiya, Auxeeliya Jesudoss, and Ashraph Sulaiman. "An Adaptive Approach to Improve the Accuracy of Packet Pre-Filtering." Advanced Materials Research 367 (October 2011): 241–48. http://dx.doi.org/10.4028/www.scientific.net/amr.367.241.
Full textMa, Jitao, Xiaohong Chen, Mrinal K. Sen, and Yaru Xue. "Free-surface multiple attenuation for blended data." GEOPHYSICS 81, no. 3 (May 2016): V227—V233. http://dx.doi.org/10.1190/geo2015-0408.1.
Full textТаха Насіф, Нух. "Using statistical traffic analysis to calculate the confidential means of information transmission." Наука і техніка Повітряних Сил Збройних Сил України, no. 1(42,) (January 21, 2021): 118–25. http://dx.doi.org/10.30748/nitps.2021.42.15.
Full textHe, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Xiao Juan Guan. "A Novel and Practical Method for Network Security Situation Prediction." Applied Mechanics and Materials 701-702 (December 2014): 907–10. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.907.
Full textHoang Hai, Tran, Le Huy Hoang, and Eui-nam Huh. "Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms." International journal of Computer Networks & Communications 12, no. 6 (November 30, 2020): 117–31. http://dx.doi.org/10.5121/ijcnc.2020.12608.
Full textCannavacciuolo, Lorella, Luca Iandoli, Cristina Ponsiglione, and Giuseppe Zollo. "Learning by failure vs learning by habits." International Journal of Entrepreneurial Behavior & Research 23, no. 3 (May 2, 2017): 524–46. http://dx.doi.org/10.1108/ijebr-11-2015-0238.
Full textZhao, Ruiqin, Yuan Liu, Octavia A. Dobre, Haiyan Wang, and Xiaohong Shen. "An Efficient Topology Discovery Protocol with Node ID Assignment Based on Layered Model for Underwater Acoustic Networks." Sensors 20, no. 22 (November 18, 2020): 6601. http://dx.doi.org/10.3390/s20226601.
Full textSreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.
Full textBrand, Charlotte O., Alex Mesoudi, and Thomas J. H. Morgan. "Trusting the experts: The domain-specificity of prestige-biased social learning." PLOS ONE 16, no. 8 (August 11, 2021): e0255346. http://dx.doi.org/10.1371/journal.pone.0255346.
Full textNguyen, Anh-Nhat, Van Nhan Vo, Chakchai So-In, and Dac-Binh Ha. "System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading." Sensors 21, no. 1 (January 4, 2021): 285. http://dx.doi.org/10.3390/s21010285.
Full textWang, Yang, Mingqiang Wang, Jingdan Zou, Jin Xu, and Jing Wang. "Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields." Wireless Communications and Mobile Computing 2019 (October 17, 2019): 1–13. http://dx.doi.org/10.1155/2019/1742386.
Full textAl-Radaei, Sami A. M., and R. B. Mishra. "A Heuristic Method for Learning Path Sequencing for Intelligent Tutoring System (ITS) in E-learning." International Journal of Intelligent Information Technologies 7, no. 4 (October 2011): 65–80. http://dx.doi.org/10.4018/jiit.2011100104.
Full textOtoum, Safa, Burak Kantarci, and Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures." ACM Transactions on Internet Technology 21, no. 4 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Full textSkelboe, Stig. "Adaptive partitioning techniques for index 1 IDEs." BIT Numerical Mathematics 50, no. 2 (February 23, 2010): 405–23. http://dx.doi.org/10.1007/s10543-010-0258-4.
Full textJeong, Hae-Seong, Gwang-Hoon Baek, and Heung-Gyoon Ryu. "Adaptive Phase Noise Compensator in Wireless ICS Repeater." Journal of Korean Institute of Electromagnetic Engineering and Science 22, no. 4 (April 30, 2011): 481–88. http://dx.doi.org/10.5515/kjkiees.2011.22.4.481.
Full textAhmadi, Hamid Reza, Navideh Mahdavi, and Mahmoud Bayat. "Applying Adaptive Pushover Analysis to Estimate Incremental Dynamic Analysis Curve." Journal of Earthquake and Tsunami 14, no. 04 (February 27, 2020): 2050016. http://dx.doi.org/10.1142/s1793431120500165.
Full textRankin, Lucille, and Gabrielle T. Belz. "Diverse Roles of Inhibitor of Differentiation 2 in Adaptive Immunity." Clinical and Developmental Immunology 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/281569.
Full textJin, Zhujun, Yu Yang, Yuling Chen, and Yuwei Chen. "IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel." International Journal of Distributed Sensor Networks 16, no. 3 (March 2020): 155014772091100. http://dx.doi.org/10.1177/1550147720911002.
Full textSachindra, Lionel Larribère, Daniel Novak, Huizi Wu, Laura Hüser, Karol Granados, Elias Orouji, and Jochen Utikal. "New role of ID3 in melanoma adaptive drug-resistance." Oncotarget 8, no. 66 (November 27, 2017): 110166–75. http://dx.doi.org/10.18632/oncotarget.22698.
Full textCastillo, Gladys, and João Gama. "Adaptive Bayesian network classifiers." Intelligent Data Analysis 13, no. 1 (February 23, 2009): 39–59. http://dx.doi.org/10.3233/ida-2009-0355.
Full textNaito, Yoshiro, Takeshi Tsujino, Mika Matsumoto, Tsuyoshi Sakoda, Mitsumasa Ohyanagi, and Tohru Masuyama. "Adaptive response of the heart to long-term anemia induced by iron deficiency." American Journal of Physiology-Heart and Circulatory Physiology 296, no. 3 (March 2009): H585—H593. http://dx.doi.org/10.1152/ajpheart.00463.2008.
Full text