Journal articles on the topic 'Network security intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network security intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Patidar, Sadhana, Priyanka Parihar, and Chetan Agrawal. "A Review of Intrusion Detection Datasets and Techniques." SMART MOVES JOURNAL IJOSCIENCE 6, no. 3 (March 10, 2020): 14–22. http://dx.doi.org/10.24113/ijoscience.v6i3.277.
Full textJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (February 18, 2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Full textLiu, Gui Guo. "Intrusion Detection Systems." Applied Mechanics and Materials 596 (July 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textReshmi, B. M., S. S. Manvi, and Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks." Mobile Information Systems 2, no. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Full textAranganathan, A., and C. D. Suriyakala. "Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i2.20.11736.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (June 10, 2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (October 26, 2020): 180. http://dx.doi.org/10.3390/fi12110180.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (November 1, 2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems." Mathematical Problems in Engineering 2021 (March 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/6639714.
Full textZHONG, SHI, TAGHI M. KHOSHGOFTAAR, and NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION." International Journal of Reliability, Quality and Safety Engineering 14, no. 02 (April 2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Full textEt. al., T. Sushma,. "A Review of the cluster based Mobile Adhoc Network Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2070–76. http://dx.doi.org/10.17762/turcomat.v12i2.1811.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (May 5, 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (February 24, 2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textLou, Ya Fang, Zhi Jun Yuan, and Hao Wu. "The Application of BP Neural Network in Network Intrusion Detection." Advanced Materials Research 765-767 (September 2013): 1415–18. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1415.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textBajtoš, Tomáš, Andrej Gajdoš, Lenka Kleinová, Katarína Lučivjanská, and Pavol Sokol. "Network Intrusion Detection with Threat Agent Profiling." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/3614093.
Full textTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Full textSun, Yu Tao. "Design and Research on Intrusion Detection System in the Computer Network Security." Applied Mechanics and Materials 416-417 (September 2013): 1418–22. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1418.
Full textAhmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.
Full textNagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Full textShyla and Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science." International Journal of Information Retrieval Research 11, no. 4 (October 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Full textWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Full textProf. Krishnakumar L, Prof Krishnakumar L., and Nisha Mariam Varughese. "Intrusion Detection Using Collaborative Network Security Management System in Cloud Computing." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 145–47. http://dx.doi.org/10.15373/2249555x/mar2014/42.
Full textJia, Ling. "Campus Network Security Program Based on Snort Network Security Intrusion Detection System." Advanced Materials Research 433-440 (January 2012): 3235–40. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3235.
Full textJiang, Ya Ping, Shi Hui Cheng, and Yong Gan. "Network Security Prevention Model Based-Immune." Applied Mechanics and Materials 16-19 (October 2009): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.881.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textQian, Jie, Yan Ping Wang, and Han Xi Li. "The Network Security System Research Based on Intrusion Detection." Applied Mechanics and Materials 596 (July 2014): 888–91. http://dx.doi.org/10.4028/www.scientific.net/amm.596.888.
Full textLiu, Chun. "Network Intrusion Detection Model Based on Genetic Algorithm Optimizing Parameters of Support Vector Machine." Advanced Materials Research 989-994 (July 2014): 2012–15. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2012.
Full textTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Full textMusthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.
Full textJawhar, Muna M. T., and Monica Mehrotra. "A Hybrid FCM Clustering- Neural Network Model for Intrusion Detection." Advanced Materials Research 403-408 (November 2011): 3519–27. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3519.
Full textKorani, Ravinder, and Dr P. Chandra Sekhar Reddy. "Anomaly based Intrusion Detection by Heuristics to Predict Intrusion Scope of IOT Network Transactions." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 797. http://dx.doi.org/10.14419/ijet.v7i2.7.10982.
Full textAnitha, Arul. "Network Security using Linux Intrusion Detection System." International Journal of Research in Computer Science 2, no. 1 (December 30, 2011): 33–38. http://dx.doi.org/10.7815/ijorcs.21.2011.012.
Full textHancock, Bill. "Automated intrusion detection systems and network security." Network Security 1998, no. 1 (January 1998): 14–15. http://dx.doi.org/10.1016/s1353-4858(00)87593-5.
Full textLv, Tai Fu. "Research on High-Density Network Intrusion Features Detection Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 1054–57. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1054.
Full textSuganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (April 1, 2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.
Full textQi, Guohong, Jie Zhou, Wenxian Jia, Menghan Liu, Shengnan Zhang, and Mengying Xu. "Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network." Wireless Communications and Mobile Computing 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/9956371.
Full textKulhare, Rachna, and Dr Divakar Singh. "Survey paper on intrusion detection techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 2 (May 20, 2013): 329–35. http://dx.doi.org/10.24297/ijct.v6i2.3498.
Full textPreethi D. and Neelu Khare. "An Intelligent Network Intrusion Detection System Using Particle Swarm Optimization (PSO) and Deep Network Networks (DNN)." International Journal of Swarm Intelligence Research 12, no. 2 (April 2021): 57–73. http://dx.doi.org/10.4018/ijsir.2021040104.
Full textSrinivasan, S., and S. P. Alampalayam. "Intrusion Detection Algorithm for MANET." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 36–49. http://dx.doi.org/10.4018/jisp.2011070103.
Full textLiu, Guojie, and Jianbiao Zhang. "CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network." Discrete Dynamics in Nature and Society 2020 (May 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/4705982.
Full textRasha Thamer Shawe, Kawther Thabt Saleh, and Farah Neamah Abbas. "Building attack detection system base on machine learning." Global Journal of Engineering and Technology Advances 6, no. 2 (February 28, 2021): 018–32. http://dx.doi.org/10.30574/gjeta.2021.6.2.0010.
Full textHuang, Luo Guang, Li Min Meng, and Yong Hong Guo. "The Application of Network Intrusion Detection Technology in Instrument." Applied Mechanics and Materials 325-326 (June 2013): 1683–87. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1683.
Full textYu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textZhu, Yongkuan, Gurjot Singh Gaba, Fahad M. Almansour, Roobaea Alroobaea, and Mehedi Masud. "Application of data mining technology in detecting network intrusion and security maintenance." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 664–76. http://dx.doi.org/10.1515/jisys-2020-0146.
Full textFarhana, Kaniz, Maqsudur Rahman, and Md Tofael Ahmed. "An intrusion detection system for packet and flow based networks using deep neural network approach." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5514. http://dx.doi.org/10.11591/ijece.v10i5.pp5514-5525.
Full textTang, Jian Gang. "Reach on Wireless Sensor Networks Security Issues and IDS Model." Applied Mechanics and Materials 530-531 (February 2014): 45–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.45.
Full textThamilarasu, Geethapriya, and Shiven Chawla. "Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things." Sensors 19, no. 9 (April 27, 2019): 1977. http://dx.doi.org/10.3390/s19091977.
Full text