Journal articles on the topic 'Adaptive Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adaptive Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
A. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textLiu, Yang Bin, Liang Shi, Bei Zhan Wang, Yuan Qin Wu, and Pan Hong Wang. "An New Agent Based Distributed Adaptive Intrusion Detection System." Advanced Materials Research 532-533 (June 2012): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.624.
Full textYu, Zhenwei, Jeffrey J. P. Tsai, and Thomas Weigert. "An adaptive automatically tuning intrusion detection system." ACM Transactions on Autonomous and Adaptive Systems 3, no. 3 (August 2008): 1–25. http://dx.doi.org/10.1145/1380422.1380425.
Full textP.S., Pawar, and Hashmi S.A. "Security Enhanced Adaptive Acknowledgment Intrusion Detection System." International Journal of Computer Applications 130, no. 7 (November 17, 2015): 51–56. http://dx.doi.org/10.5120/ijca2015907055.
Full textElfeshawy, Nawal A., and Osama S. Faragallah. "Divided two-part adaptive intrusion detection system." Wireless Networks 19, no. 3 (June 13, 2012): 301–21. http://dx.doi.org/10.1007/s11276-012-0467-7.
Full textIbrahim, Nurudeen Mahmud, and Anazida Zainal. "An Adaptive Intrusion Detection Scheme for Cloud Computing." International Journal of Swarm Intelligence Research 10, no. 4 (October 2019): 53–70. http://dx.doi.org/10.4018/ijsir.2019100104.
Full textHacini, Salima, Zahia Guessoum, and Mohamed Cheikh. "False Alarm Reduction Using Adaptive Agent-Based Profiling." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 53–74. http://dx.doi.org/10.4018/ijisp.2013100105.
Full textChiche, Alebachew, and Million Meshesha. "Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection." Journal of Computer Networks and Communications 2021 (January 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/8845540.
Full textOwens, Stephen F., and Reuven R. Levary. "An adaptive expert system approach for intrusion detection." International Journal of Security and Networks 1, no. 3/4 (2006): 206. http://dx.doi.org/10.1504/ijsn.2006.011780.
Full textCheng, Bo-Chao, and Ryh-Yuh Tseng. "A Context Adaptive Intrusion Detection System for MANET." Computer Communications 34, no. 3 (March 2011): 310–18. http://dx.doi.org/10.1016/j.comcom.2010.06.015.
Full textHofmeyr, Steven A., and Stephanie Forrest. "Architecture for an Artificial Immune System." Evolutionary Computation 8, no. 4 (December 2000): 443–73. http://dx.doi.org/10.1162/106365600568257.
Full textRamdane, Chikh, and Salim Chikhi. "A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System." International Journal of Information Security and Privacy 8, no. 4 (October 2014): 1–25. http://dx.doi.org/10.4018/ijisp.2014100101.
Full textAlaparthy, Vishwa, and Salvatore D. Morgera. "Modeling an Intrusion Detection System Based on Adaptive Immunology." International Journal of Interdisciplinary Telecommunications and Networking 11, no. 2 (April 2019): 42–55. http://dx.doi.org/10.4018/ijitn.2019040104.
Full textSim, Kwee-Bo, and Jae-Won Yang. "Adaptive Intrusion Detection Algorithm based on Artificial Immune System." Journal of Korean Institute of Intelligent Systems 13, no. 2 (April 1, 2003): 169–74. http://dx.doi.org/10.5391/jkiis.2003.13.2.169.
Full textLee, Han-Sung, Young-Hee Im, Joo-Young Park, and Dai-Hee Park. "Adaptive Intrusion Detection System Based on SVM and Clustering." Journal of Korean Institute of Intelligent Systems 13, no. 2 (April 1, 2003): 237–42. http://dx.doi.org/10.5391/jkiis.2003.13.2.237.
Full textPlatonov, V. V., and P. O. Semenov. "An adaptive model of a distributed intrusion detection system." Automatic Control and Computer Sciences 51, no. 8 (December 2017): 894–98. http://dx.doi.org/10.3103/s0146411617080168.
Full textPriyanka, Lohar, and Lomte Archana. "UNIACK- Universal Adaptive Acknowledge Intrusion Detection System in Manets." International Journal of Computer Applications 123, no. 4 (August 18, 2015): 1–4. http://dx.doi.org/10.5120/ijca2015905276.
Full textWang, Jin. "An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System." Journal of Computer Research and Development 42, no. 11 (2005): 1934. http://dx.doi.org/10.1360/crad20051116.
Full textSheltami, Tarek, Abdulsalam Basabaa, and Elhadi Shakshuki. "A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs." Journal of Ambient Intelligence and Humanized Computing 5, no. 4 (June 5, 2014): 611–20. http://dx.doi.org/10.1007/s12652-014-0232-0.
Full textAl-Yaseen, Wathiq Laftah, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. "Real-time multi-agent system for an adaptive intrusion detection system." Pattern Recognition Letters 85 (January 2017): 56–64. http://dx.doi.org/10.1016/j.patrec.2016.11.018.
Full textDharmarajan, R., and V. Thiagarasu. "Computation of Risk Severity of the Malicious Node using Adaptive Neuro Fuzzy Inference System (ANFIS)." Asian Journal of Engineering and Applied Technology 8, no. 1 (February 5, 2019): 9–14. http://dx.doi.org/10.51983/ajeat-2019.8.1.1067.
Full textPang, Se-chung, Yang-woo Kim, Yoon-hee Kim, and Phil-Woo Lee. "An Optimum-adaptive Intrusion Detection System Using a Mobile Code." KIPS Transactions:PartC 12C, no. 1 (February 1, 2005): 45–52. http://dx.doi.org/10.3745/kipstc.2005.12c.1.045.
Full textJagadeesan, A. P., and K. Gnanambal. "Semi-Supervised Multi-Instance Neurologic Adaptive Learning Intrusion Detection System." Applied Mathematics & Information Sciences 13, no. 2 (March 1, 2019): 291–98. http://dx.doi.org/10.18576/amis/130218.
Full textShafi, Kamran, and Hussein A. Abbass. "An adaptive genetic-based signature learning system for intrusion detection." Expert Systems with Applications 36, no. 10 (December 2009): 12036–43. http://dx.doi.org/10.1016/j.eswa.2009.03.036.
Full textBakhsh, Sheikh Tahir, Saleh Alghamdi, Rayan A. Alsemmeari, and Syed Raheel Hassan. "An adaptive intrusion detection and prevention system for Internet of Things." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988810. http://dx.doi.org/10.1177/1550147719888109.
Full textZeng, Xia Ling, and Lin Zhang. "Intrusion Detection Model Based on Fuzzy Comprehensive Evaluation." Applied Mechanics and Materials 635-637 (September 2014): 1574–77. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1574.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textGlickman, Matthew, Justin Balthrop, and Stephanie Forrest. "A Machine Learning Evaluation of an Artificial Immune System." Evolutionary Computation 13, no. 2 (June 2005): 179–212. http://dx.doi.org/10.1162/1063656054088503.
Full textWang, Yang, Liqiang Zhu, Zujun Yu, and Baoqing Guo. "An Adaptive Track Segmentation Algorithm for a Railway Intrusion Detection System." Sensors 19, no. 11 (June 6, 2019): 2594. http://dx.doi.org/10.3390/s19112594.
Full textResende, Paulo Angelo Alves, and André Costa Drummond. "Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling." Security and Privacy 1, no. 4 (July 2018): e36. http://dx.doi.org/10.1002/spy2.36.
Full textOrang, Zahra Atashbar, Ezzat Moradpour, Ahmad Habibizad Navin, Amir Azimi Alasti Ahrabim, and Mir Kamal Mirnia. "Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems." International Journal of Computer Network and Information Security 4, no. 11 (October 9, 2012): 32–38. http://dx.doi.org/10.5815/ijcnis.2012.11.04.
Full textVenkatraman, S., and B. Surendiran. "Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems." Multimedia Tools and Applications 79, no. 5-6 (May 4, 2019): 3993–4010. http://dx.doi.org/10.1007/s11042-019-7495-6.
Full textTeng, Shaohua, Naiqi Wu, Haibin Zhu, Luyao Teng, and Wei Zhang. "SVM-DT-based adaptive and collaborative intrusion detection." IEEE/CAA Journal of Automatica Sinica 5, no. 1 (January 2018): 108–18. http://dx.doi.org/10.1109/jas.2017.7510730.
Full textEt. al., K. NandhaKumar,. "A Hybrid Adaptive Development Algorithm and Machine Learning Based Method for Intrusion Detection and Prevention System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1226–36. http://dx.doi.org/10.17762/turcomat.v12i5.1789.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textLONG, JUN, WENTAO ZHAO, FANGZHOU ZHU, and ZHIPING CAI. "ACTIVE LEARNING TO DEFEND POISONING ATTACK AGAINST SEMI-SUPERVISED INTRUSION DETECTION CLASSIFIER." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 19, supp01 (December 2011): 93–106. http://dx.doi.org/10.1142/s0218488511007362.
Full textLuo, Xiaolin. "Model design artificial intelligence and research of adaptive network intrusion detection and defense system using fuzzy logic." Journal of Intelligent & Fuzzy Systems 40, no. 4 (April 12, 2021): 8227–35. http://dx.doi.org/10.3233/jifs-189645.
Full textWan, Lin. "V-Detector-Based Immune Negative Intrusion Detection Algorithm." Applied Mechanics and Materials 263-266 (December 2012): 2966–71. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2966.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (January 2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textLiu, Xuefei, Chao Zhang, Pingzeng Liu, Maoling Yan, Baojia Wang, Jianyong Zhang, and Russell Higgs. "Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT." Security and Communication Networks 2018 (December 18, 2018): 1–10. http://dx.doi.org/10.1155/2018/1635081.
Full textZhuang, Wei, Yixian Shen, Lu Li, Chunming Gao, and Dong Dai. "Develop an Adaptive Real-Time Indoor Intrusion Detection System Based on Empirical Analysis of OFDM Subcarriers." Sensors 21, no. 7 (March 25, 2021): 2287. http://dx.doi.org/10.3390/s21072287.
Full textChoi, Seul-Gi, and Sung-Bae Cho. "Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions." Logic Journal of the IGPL 28, no. 4 (December 9, 2019): 449–60. http://dx.doi.org/10.1093/jigpal/jzz053.
Full textAnjana Devi and Bhuvaneswaran. "Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET." International Journal of Network Security & Its Applications 3, no. 5 (September 30, 2011): 243–56. http://dx.doi.org/10.5121/ijnsa.2011.3519.
Full textAnanthi, P., and P. Balasubramanie. "An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security." Research Journal of Applied Sciences, Engineering and Technology 7, no. 16 (April 25, 2014): 3348–55. http://dx.doi.org/10.19026/rjaset.7.680.
Full textLiu, Jingmei, Yuanbo Gao, and Fengjie Hu. "A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM." Computers & Security 106 (July 2021): 102289. http://dx.doi.org/10.1016/j.cose.2021.102289.
Full textXue, Yu, Weiwei Jia, Xuejian Zhao, and Wei Pang. "An Evolutionary Computation Based Feature Selection Method for Intrusion Detection." Security and Communication Networks 2018 (October 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/2492956.
Full textKorba, Abdelaziz Amara, Mehdi Nafaa, and Salim Ghanemi. "Hybrid Intrusion Detection Framework for Ad hoc networks." International Journal of Information Security and Privacy 10, no. 4 (October 2016): 1–32. http://dx.doi.org/10.4018/ijisp.2016100101.
Full textBoudjemaa, Kheddar, and Ping Song. "Indoor Human Detection and Monitoring System Using PIR Wireless Sensors Array." Applied Mechanics and Materials 541-542 (March 2014): 1297–303. http://dx.doi.org/10.4028/www.scientific.net/amm.541-542.1297.
Full textZou, Li Kun, Shao Kun Liu, and Guo Fu Ma. "Intrusion Detection Model Based on Improved Genetic Algorithm Neural Network in Computer Integrated Process System." Applied Mechanics and Materials 380-384 (August 2013): 2708–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2708.
Full text