Journal articles on the topic 'IDS IMPLEMENTATION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IDS IMPLEMENTATION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tarkhan, Mahdi, Saeed Bagheri Shouraki, and Seyed Hossein Khasteh. "A novel hardware implementation of IDS method." IEICE Electronics Express 6, no. 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Full textPaul, Morgan. "Looking to the Future." Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, no. 1 (September 8, 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.
Full textMizutani, Masayoshi, Shin Shirahata, Masaki Minami, and Jun Murai. "The design and implementation of session-based IDS." Electronics and Communications in Japan (Part I: Communications) 89, no. 3 (March 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.
Full textBush-Mecenas, Susan, Julie A. Marsh, and Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform." Teachers College Record: The Voice of Scholarship in Education 122, no. 10 (October 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.
Full textMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki, and Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method." IEEE Transactions on Fuzzy Systems 19, no. 6 (December 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Full textBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss, and Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Full textBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon, and David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies." Antibiotics 9, no. 12 (November 27, 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.
Full textMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (March 31, 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Full textKim, Song-Mok, and Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano." Journal of Digital Contents Society 24, no. 11 (November 30, 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Full textSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Full textOtoum, Safa, Burak Kantarci, and Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures." ACM Transactions on Internet Technology 21, no. 4 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Full textHa, Jaecheol. "Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network." Journal of the Korea Institute of Information Security and Cryptology 26, no. 5 (October 31, 2016): 1313–22. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1313.
Full textDewi Paramitha, Ida Ayu Shinta, Gusti Made Arya Sasmita, and I. Made Sunia Raharja. "Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means." Majalah Ilmiah Teknologi Elektro 19, no. 1 (October 15, 2020): 95. http://dx.doi.org/10.24843/mite.2020.v19i01.p14.
Full textAgarwal, Nancy, and Syed Zeeshan Hussain. "A Closer Look at Intrusion Detection System for Web Applications." Security and Communication Networks 2018 (August 14, 2018): 1–27. http://dx.doi.org/10.1155/2018/9601357.
Full textRyan, Nessa E., Bernadette Boden-Albala, Gabriel Ganyaglo, and Alison El Ayadi. "4112 Tools for Self-Management of Obstetric Fistula in Low and Middle-income Countries: A Qualitative Study Exploring Pre-implementation Barriers and Facilitators among Global Stakeholders." Journal of Clinical and Translational Science 4, s1 (June 2020): 149–50. http://dx.doi.org/10.1017/cts.2020.440.
Full textKim, Youbin, and Jaehwan Lee. "Implementation Guide and Evaluation of IAP Process for Convergence Product Design." Journal of Industrial Design Studies 51 (March 31, 2020): 45–52. http://dx.doi.org/10.37254/ids.2020.03.51.05.45.
Full textPietro Spadaccino and Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing." ITU Journal on Future and Evolving Technologies 3, no. 2 (September 22, 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Full textMudaranthakam, Dinesh Pal, Colin Cernik, Leslie Curtis, Blake Griffith, Jinxiang Hu, Jo Wick, Jeffrey Thompson, et al. "Utilization of Technology to Improve Efficiency in Investigational Drug Management Processes." Journal of Pharmacy Technology 36, no. 2 (January 22, 2020): 84–90. http://dx.doi.org/10.1177/8755122519900049.
Full textMahbooba, Basim, Radhya Sahal, Wael Alosaimi, and Martin Serrano. "Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models." Complexity 2021 (March 8, 2021): 1–23. http://dx.doi.org/10.1155/2021/5538896.
Full textLeBrón, Alana M. W., Keta Cowan, William D. Lopez, Nicole L. Novak, Maria Ibarra-Frayre, and Jorge Delva. "The Washtenaw ID Project: A Government-Issued ID Coalition Working Toward Social, Economic, and Racial Justice and Health Equity." Health Education & Behavior 46, no. 1_suppl (September 24, 2019): 53S—61S. http://dx.doi.org/10.1177/1090198119864078.
Full textLodhi, Mala Bharti, Vineet Richhariya, and Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET." International Journal of Research -GRANTHAALAYAH 2, no. 3 (December 31, 2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Full textLatifi, Zeinab, Kamal Jamshidi, and Ali Bohlooli. "Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing." International Journal of Computer Network and Information Security 5, no. 10 (August 1, 2013): 30–36. http://dx.doi.org/10.5815/ijcnis.2013.10.05.
Full textSammon, Cormac J., Thomas P. Leahy, and Sreeram Ramagopalan. "Nonindependence of patient data in the clinical practice research datalink: a case study in atrial fibrillation patients." Journal of Comparative Effectiveness Research 9, no. 6 (April 2020): 395–403. http://dx.doi.org/10.2217/cer-2019-0191.
Full textBilyeu, Heather, Jon Washburn, Lacey Vermette, and Tracy Klug. "Validation and Implementation of a Highly Sensitive and Efficient Newborn Screening Assay for Mucopolysaccharidosis Type II." International Journal of Neonatal Screening 6, no. 4 (October 14, 2020): 79. http://dx.doi.org/10.3390/ijns6040079.
Full textWei, Shugong. "Implementation and evaluation of a laser scan localization scheme for sensor nodes." Sensor Review 40, no. 1 (January 13, 2020): 97–106. http://dx.doi.org/10.1108/sr-08-2019-0210.
Full textNikoloudakis, Yannis, Ioannis Kefaloukos, Stylianos Klados, Spyros Panagiotakis, Evangelos Pallis, Charalabos Skianis, and Evangelos K. Markakis. "Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation." Sensors 21, no. 14 (July 20, 2021): 4939. http://dx.doi.org/10.3390/s21144939.
Full textEsterline, Albert, and Sridhar Kota. "A general paradigm for routine design—theory and implementation." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 6, no. 2 (May 1992): 73–93. http://dx.doi.org/10.1017/s0890060400002973.
Full textSlamet, Slamet, and Izzeldin Ibrahim Mohamed Abdelaziz. "An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm." Bulletin of Electrical Engineering and Informatics 11, no. 2 (April 1, 2022): 1018–25. http://dx.doi.org/10.11591/eei.v11i2.3308.
Full textHousman, Ian, Robert Chastain, and Mark Finco. "An Evaluation of Forest Health Insect and Disease Survey Data and Satellite-Based Remote Sensing Forest Change Detection Methods: Case Studies in the United States." Remote Sensing 10, no. 8 (July 27, 2018): 1184. http://dx.doi.org/10.3390/rs10081184.
Full textPurnama, Tommy, Yusuf Muhyidin, and Dayan Singasatia. "IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) SNORT SEBAGAI SISTEM KEAMANAN MENGGUNAKAN WHATSAPP DAN TELEGRAM SEBAGAI MEDIA NOTIFIKASI." JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI 14, no. 2 (September 1, 2023): 358–69. http://dx.doi.org/10.51903/jtikp.v14i2.726.
Full textReddy, N. Chandra Sekhar. "An Implementation of Novel Feature Subset Selection Algorithm for IDS in Mobile Networks." International Journal of Advanced Trends in Computer Science and Engineering 8, no. 5 (October 15, 2019): 2132–41. http://dx.doi.org/10.30534/ijatcse/2019/43852019.
Full textPuschmann, Paul, and Luciana Quaranta. "Editorial." Historical Life Course Studies 5 (January 11, 2018): 1–2. http://dx.doi.org/10.51964/hlcs9333.
Full textPowell, James, Carol Hoover, Andrew Gordon, and Michelle Mittrach. "Bridging identity challenges: why and how one library plugged ORCiD into their enterprise." Library Hi Tech 37, no. 3 (September 16, 2019): 625–39. http://dx.doi.org/10.1108/lht-04-2018-0046.
Full textWidodo, Rio, and Imam Riadi. "Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 1 (January 13, 2021): 21. http://dx.doi.org/10.12928/biste.v3i1.1752.
Full textInman, D., D. Simidchiev, and P. Jeffrey. "Elicitation of expert knowledge to develop decision support tools for use in water demand management planning." Water Supply 7, no. 5-6 (December 1, 2007): 53–60. http://dx.doi.org/10.2166/ws.2007.110.
Full textSadikin, Fal, and Nuruddin Wiranda. "ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, no. 1 (April 30, 2023): 7–16. http://dx.doi.org/10.20527/jtiulm.v8i1.152.
Full textNazir, Anjum, Zulfiqar Memon, Touseef Sadiq, Hameedur Rahman, and Inam Ullah Khan. "A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection." Sensors 23, no. 19 (September 28, 2023): 8153. http://dx.doi.org/10.3390/s23198153.
Full textMatthijs, Koen, and Paul Puschmann. "Editorial." Historical Life Course Studies 2 (May 11, 2015): 37. http://dx.doi.org/10.51964/hlcs9357.
Full textDulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Full textHulsen, Tim. "BioVenn – an R and Python package for the comparison and visualization of biological lists using area-proportional Venn diagrams." Data Science 4, no. 1 (May 21, 2021): 51–61. http://dx.doi.org/10.3233/ds-210032.
Full textSadikin, Fal, and Nuruddin Wiranda. "INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, no. 1 (April 30, 2023): 23–30. http://dx.doi.org/10.20527/jtiulm.v8i1.153.
Full textHuh, Jun-Ho. "Implementation of lightweight intrusion detection model for security of smart green house and vertical farm." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771876763. http://dx.doi.org/10.1177/1550147718767630.
Full textHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection." Electronics 9, no. 10 (October 14, 2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Full textChalichalamala, Silpa, Niranjana Govindan, and Ramani Kasarapu. "Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things." Sensors 23, no. 23 (December 3, 2023): 9583. http://dx.doi.org/10.3390/s23239583.
Full textAlamsyah, Nur. "ENHANCING INTRUSION DETECTION SYSTEM ON NODEMCU WITH ENSEMBLE VOTING." Jurnal Elektro dan Telekomunikasi Terapan 9, no. 2 (March 6, 2023): 1271. http://dx.doi.org/10.25124/jett.v9i2.5437.
Full textBerenice Arzate-Rueda, Enrique Reyes-Archundia, Juan C. Olivares-Rojas, Jose A. Gutiérrez-Gnecchi, Maria del C. García-Ramírez, Marco V. Chávez-Báez, and Javier A. Rodríguez-Herrejón. "Intrusion detection system in a hardware in the loop scenario." Global Journal of Engineering and Technology Advances 17, no. 3 (December 30, 2023): 036–44. http://dx.doi.org/10.30574/gjeta.2023.17.3.0247.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textPinuji, Sukmo. "INTEGRASI SISTEM INFORMASI PERTANAHAN DAN INFRASTRUKTUR DATA SPASIAL DALAM RANGKA PERWUJUDAN ONE MAP POLICY." BHUMI: Jurnal Agraria dan Pertanahan 2, no. 1 (May 31, 2016): 48. http://dx.doi.org/10.31292/jb.v2i1.31.
Full textMacIntosh, Eric, A. Lauren Couture, and Kirsty Spence. "Management challenges in delivering an international sport and development program." Sport, Business and Management: An International Journal 5, no. 3 (July 13, 2015): 276–96. http://dx.doi.org/10.1108/sbm-07-2012-0028.
Full textGhori, Muhammad Rizwan, Tat-Chee Wan, and Gian Chand Sodhy. "Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols." Sensors 20, no. 12 (June 25, 2020): 3590. http://dx.doi.org/10.3390/s20123590.
Full text