Journal articles on the topic 'Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (February 24, 2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (May 5, 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (October 31, 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Full textBattini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (November 30, 2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.
Full textJatti, Ashwini V., and V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review." Restaurant Business 118, no. 6 (June 3, 2019): 60–79. http://dx.doi.org/10.26643/rb.v118i6.7239.
Full textJatti, Ashwini V., and V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review." Restaurant Business 118, no. 7 (July 28, 2019): 50–58. http://dx.doi.org/10.26643/rb.v118i7.7246.
Full textSingh Tomar, Apoorv, and Brijesh Kumar Chaurasia. "Intrusion Detection System and Its Attacks Detection: Comparative." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 1 (January 30, 2017): 1–6. http://dx.doi.org/10.23956/ijarcsse/v7i1/0147.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textLafta, Hameed. "Network Intrusion Detection Using Optimal Perception with Cuckoo Algorithm." Wasit Journal for Pure sciences 3, no. 1 (March 30, 2024): 95–105. http://dx.doi.org/10.31185/wjps.326.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textSreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (November 30, 2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.
Full textKamble, Arvind, and Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems." International Journal of Swarm Intelligence Research 13, no. 3 (July 1, 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Full textDeshpande, Apoorva. "A Review on Intrusion Detection System using Artificial Intelligence Approach." SMART MOVES JOURNAL IJOSCIENCE 4, no. 8 (August 5, 2018): 6. http://dx.doi.org/10.24113/ijoscience.v4i8.153.
Full textPriya, Ms Siva. "Intrusion Detection System Using Probabilistic Adaptive Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 1222–25. http://dx.doi.org/10.22214/ijraset.2024.61565.
Full textLi, You Guo. "Analysis of the Snort Building Code Based on IDS." Applied Mechanics and Materials 543-547 (March 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Full textMaseno, Elijah M., Zenghui Wang, and Hongyan Xing. "A Systematic Review on Hybrid Intrusion Detection System." Security and Communication Networks 2022 (May 10, 2022): 1–23. http://dx.doi.org/10.1155/2022/9663052.
Full textMao, Yi Min, Xiao Fang Xue, and Jin Qing Chen. "An Intrusion Detection Model Based on Mining Maximal Frequent Itemsets over Data Streams." Applied Mechanics and Materials 339 (July 2013): 341–48. http://dx.doi.org/10.4028/www.scientific.net/amm.339.341.
Full textYu, Jie, Guo Xiang Yao, and Wei Wei Zhang. "Intrusion Detection Method Based on Frequent Pattern." Advanced Materials Research 204-210 (February 2011): 1751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1751.
Full textLi, Yimin, Dezhi Han, Mingming Cui, Fan Yuan, and Yachao Zhou. "RESNETCNN: An abnormal network traffic flows detection model." Computer Science and Information Systems, no. 00 (2023): 4. http://dx.doi.org/10.2298/csis221124004l.
Full textSingh, Amit, Jay Prakash, Gaurav Kumar, Praphula Kumar Jain, and Loknath Sai Ambati. "Intrusion Detection System." Journal of Database Management 35, no. 1 (February 14, 2024): 1–25. http://dx.doi.org/10.4018/jdm.338276.
Full textA P, Niharika. "Deep Learning Approach for Intrusion Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 22, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem33646.
Full textHasan, Mokhtar Mohammed, and Noor Adnan Ibraheem. "APPLYING ADAPTIVE FUZZY NEURAL ALGORITHM FOR INTRUSION DETECTION." Journal of Engineering 16, no. 01 (April 1, 2010): 4488–509. http://dx.doi.org/10.31026/j.eng.2010.01.08.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textS, Reshni. "Cyber Intrusion Detection System Using Deep Learning Approach." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5886–88. http://dx.doi.org/10.22214/ijraset.2024.61352.
Full textKaur, Avneet, Shruti Pawar, Neha Jore, Varsha Chavan, and Nikita Mule. "Intrusion Detection System using Blockchain." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 569–71. http://dx.doi.org/10.22214/ijraset.2024.58361.
Full textPavani, Konagala, and Auvula Damodaram. "Multi-class Intrusion Detection System for MANETs." Journal of Advances in Computer Networks 3, no. 2 (2015): 93–98. http://dx.doi.org/10.7763/jacn.2015.v3.148.
Full textTamilarasi, T., and Sangeetha Varadhan. "Crime Analysis Mapping with Intrusion Detection System." International Journal of Research Publication and Reviews 5, no. 5 (May 2, 2024): 6411–16. http://dx.doi.org/10.55248/gengpi.5.0524.1106.
Full textSusanto, Bekti Maryuni. "Naïve Bayes Decision Tree Hybrid Approach for Intrusion Detection System." Bulletin of Electrical Engineering and Informatics 2, no. 3 (September 1, 2013): 225–32. http://dx.doi.org/10.11591/eei.v2i3.208.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textJacobus, Agustinus, and Edi Winarko. "Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (January 31, 2014): 13. http://dx.doi.org/10.22146/ijccs.3491.
Full textTao, Ran, Li Yang, Lu Peng, and Bin Li. "A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections." International Journal of Information Security and Privacy 4, no. 1 (January 2010): 18–31. http://dx.doi.org/10.4018/jisp.2010010102.
Full textQazi, Emad Ul Haq, Muhammad Hamza Faheem, and Tanveer Zia. "HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System." Applied Sciences 13, no. 8 (April 14, 2023): 4921. http://dx.doi.org/10.3390/app13084921.
Full textDr. P. Gokulakrishnan, Dr. N. Dhanalakshmi, Dr S. Satheesbabu,. "THE SURVEILLANCE OF INTRUSION DETECTION SYSTEMS AND APPROACHES." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 17, 2021): 1135–50. http://dx.doi.org/10.17762/itii.v9i1.247.
Full textKhraisat, Gondal, Vamplew, Kamruzzaman, and Alazab. "A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks." Electronics 8, no. 11 (October 23, 2019): 1210. http://dx.doi.org/10.3390/electronics8111210.
Full textRathod, Yagnik. "A PREVENTIVE APPROACH USING THE DATA MINING OF TRANSACTION AUDIT LOG FOR DATABASE INTRUSION DETECTION." Journal of Research in Engineering and Applied Sciences 7, no. 3 (February 25, 2023): 391–96. http://dx.doi.org/10.46565/jreas.202273391-396.
Full textMane, Prof Dipali. "Machine Learning Algorithms for Intrusion Detection in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6315–21. http://dx.doi.org/10.22214/ijraset.2023.52788.
Full textManikandan, Deepa, and Jayaseelan Dhilipan. "Machine learning approach for intrusion detection system using dimensionality reduction." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 1 (April 1, 2024): 430. http://dx.doi.org/10.11591/ijeecs.v34.i1.pp430-440.
Full textKalaivani, A., and R. Pugazendi. "A Review on Intrusion Detection System and its Techniques." Data Analytics and Artificial Intelligence 3, no. 2 (February 1, 2023): 132–37. http://dx.doi.org/10.46632/daai/3/2/24.
Full textA. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textVerma, Anil, Enish Paneru, and Bishal Baaniya. "Anomaly-Based Network Intrusion Detection System." Journal of Lumbini Engineering College 4, no. 1 (December 7, 2022): 38–42. http://dx.doi.org/10.3126/lecj.v4i1.49364.
Full textKukushkina, Nadezhda, and Aleksey Novokhrestov. "Development of the laboratory bench for studying intrusion detection systems." Digital technology security, no. 4 (December 27, 2021): 37–53. http://dx.doi.org/10.17212/2782-2230-2021-4-37-53.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (February 8, 2022): 530. http://dx.doi.org/10.3390/math10030530.
Full textProtić, Danijela, and Miomir Stanković. "Detection of Anomalies in the Computer Network Behaviour." European Journal of Engineering and Formal Sciences 4, no. 1 (February 21, 2020): 7. http://dx.doi.org/10.26417/ejef.v4i1.p7-13.
Full text