Artículos de revistas sobre el tema "IDS IMPLEMENTATION"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IDS IMPLEMENTATION".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Tarkhan, Mahdi, Saeed Bagheri Shouraki y Seyed Hossein Khasteh. "A novel hardware implementation of IDS method". IEICE Electronics Express 6, n.º 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Texto completoPaul, Morgan. "Looking to the Future". Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, n.º 1 (8 de septiembre de 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.
Texto completoMizutani, Masayoshi, Shin Shirahata, Masaki Minami y Jun Murai. "The design and implementation of session-based IDS". Electronics and Communications in Japan (Part I: Communications) 89, n.º 3 (marzo de 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.
Texto completoBush-Mecenas, Susan, Julie A. Marsh y Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform". Teachers College Record: The Voice of Scholarship in Education 122, n.º 10 (octubre de 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.
Texto completoMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki y Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method". IEEE Transactions on Fuzzy Systems 19, n.º 6 (diciembre de 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Texto completoBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss y Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture". International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, n.º 1 (enero de 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Texto completoBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon y David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies". Antibiotics 9, n.º 12 (27 de noviembre de 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.
Texto completoMahesh T R, V Vivek y Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS". International Journal of Information Technology, Research and Applications 2, n.º 1 (31 de marzo de 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Texto completoKim, Song-Mok y Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano". Journal of Digital Contents Society 24, n.º 11 (30 de noviembre de 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Texto completoSilva, Rui Filipe, Raul Barbosa y Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks". International Journal of Information Security and Privacy 14, n.º 2 (abril de 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Texto completoOtoum, Safa, Burak Kantarci y Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures". ACM Transactions on Internet Technology 21, n.º 4 (22 de julio de 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Texto completoHa, Jaecheol. "Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network". Journal of the Korea Institute of Information Security and Cryptology 26, n.º 5 (31 de octubre de 2016): 1313–22. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1313.
Texto completoDewi Paramitha, Ida Ayu Shinta, Gusti Made Arya Sasmita y I. Made Sunia Raharja. "Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means". Majalah Ilmiah Teknologi Elektro 19, n.º 1 (15 de octubre de 2020): 95. http://dx.doi.org/10.24843/mite.2020.v19i01.p14.
Texto completoAgarwal, Nancy y Syed Zeeshan Hussain. "A Closer Look at Intrusion Detection System for Web Applications". Security and Communication Networks 2018 (14 de agosto de 2018): 1–27. http://dx.doi.org/10.1155/2018/9601357.
Texto completoRyan, Nessa E., Bernadette Boden-Albala, Gabriel Ganyaglo y Alison El Ayadi. "4112 Tools for Self-Management of Obstetric Fistula in Low and Middle-income Countries: A Qualitative Study Exploring Pre-implementation Barriers and Facilitators among Global Stakeholders". Journal of Clinical and Translational Science 4, s1 (junio de 2020): 149–50. http://dx.doi.org/10.1017/cts.2020.440.
Texto completoKim, Youbin y Jaehwan Lee. "Implementation Guide and Evaluation of IAP Process for Convergence Product Design". Journal of Industrial Design Studies 51 (31 de marzo de 2020): 45–52. http://dx.doi.org/10.37254/ids.2020.03.51.05.45.
Texto completoPietro Spadaccino y Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing". ITU Journal on Future and Evolving Technologies 3, n.º 2 (22 de septiembre de 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Texto completoMudaranthakam, Dinesh Pal, Colin Cernik, Leslie Curtis, Blake Griffith, Jinxiang Hu, Jo Wick, Jeffrey Thompson et al. "Utilization of Technology to Improve Efficiency in Investigational Drug Management Processes". Journal of Pharmacy Technology 36, n.º 2 (22 de enero de 2020): 84–90. http://dx.doi.org/10.1177/8755122519900049.
Texto completoMahbooba, Basim, Radhya Sahal, Wael Alosaimi y Martin Serrano. "Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models". Complexity 2021 (8 de marzo de 2021): 1–23. http://dx.doi.org/10.1155/2021/5538896.
Texto completoLeBrón, Alana M. W., Keta Cowan, William D. Lopez, Nicole L. Novak, Maria Ibarra-Frayre y Jorge Delva. "The Washtenaw ID Project: A Government-Issued ID Coalition Working Toward Social, Economic, and Racial Justice and Health Equity". Health Education & Behavior 46, n.º 1_suppl (24 de septiembre de 2019): 53S—61S. http://dx.doi.org/10.1177/1090198119864078.
Texto completoLodhi, Mala Bharti, Vineet Richhariya y Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET". International Journal of Research -GRANTHAALAYAH 2, n.º 3 (31 de diciembre de 2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Texto completoLatifi, Zeinab, Kamal Jamshidi y Ali Bohlooli. "Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing". International Journal of Computer Network and Information Security 5, n.º 10 (1 de agosto de 2013): 30–36. http://dx.doi.org/10.5815/ijcnis.2013.10.05.
Texto completoSammon, Cormac J., Thomas P. Leahy y Sreeram Ramagopalan. "Nonindependence of patient data in the clinical practice research datalink: a case study in atrial fibrillation patients". Journal of Comparative Effectiveness Research 9, n.º 6 (abril de 2020): 395–403. http://dx.doi.org/10.2217/cer-2019-0191.
Texto completoBilyeu, Heather, Jon Washburn, Lacey Vermette y Tracy Klug. "Validation and Implementation of a Highly Sensitive and Efficient Newborn Screening Assay for Mucopolysaccharidosis Type II". International Journal of Neonatal Screening 6, n.º 4 (14 de octubre de 2020): 79. http://dx.doi.org/10.3390/ijns6040079.
Texto completoWei, Shugong. "Implementation and evaluation of a laser scan localization scheme for sensor nodes". Sensor Review 40, n.º 1 (13 de enero de 2020): 97–106. http://dx.doi.org/10.1108/sr-08-2019-0210.
Texto completoNikoloudakis, Yannis, Ioannis Kefaloukos, Stylianos Klados, Spyros Panagiotakis, Evangelos Pallis, Charalabos Skianis y Evangelos K. Markakis. "Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation". Sensors 21, n.º 14 (20 de julio de 2021): 4939. http://dx.doi.org/10.3390/s21144939.
Texto completoEsterline, Albert y Sridhar Kota. "A general paradigm for routine design—theory and implementation". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 6, n.º 2 (mayo de 1992): 73–93. http://dx.doi.org/10.1017/s0890060400002973.
Texto completoSlamet, Slamet y Izzeldin Ibrahim Mohamed Abdelaziz. "An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm". Bulletin of Electrical Engineering and Informatics 11, n.º 2 (1 de abril de 2022): 1018–25. http://dx.doi.org/10.11591/eei.v11i2.3308.
Texto completoHousman, Ian, Robert Chastain y Mark Finco. "An Evaluation of Forest Health Insect and Disease Survey Data and Satellite-Based Remote Sensing Forest Change Detection Methods: Case Studies in the United States". Remote Sensing 10, n.º 8 (27 de julio de 2018): 1184. http://dx.doi.org/10.3390/rs10081184.
Texto completoPurnama, Tommy, Yusuf Muhyidin y Dayan Singasatia. "IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) SNORT SEBAGAI SISTEM KEAMANAN MENGGUNAKAN WHATSAPP DAN TELEGRAM SEBAGAI MEDIA NOTIFIKASI". JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI 14, n.º 2 (1 de septiembre de 2023): 358–69. http://dx.doi.org/10.51903/jtikp.v14i2.726.
Texto completoReddy, N. Chandra Sekhar. "An Implementation of Novel Feature Subset Selection Algorithm for IDS in Mobile Networks". International Journal of Advanced Trends in Computer Science and Engineering 8, n.º 5 (15 de octubre de 2019): 2132–41. http://dx.doi.org/10.30534/ijatcse/2019/43852019.
Texto completoPuschmann, Paul y Luciana Quaranta. "Editorial". Historical Life Course Studies 5 (11 de enero de 2018): 1–2. http://dx.doi.org/10.51964/hlcs9333.
Texto completoPowell, James, Carol Hoover, Andrew Gordon y Michelle Mittrach. "Bridging identity challenges: why and how one library plugged ORCiD into their enterprise". Library Hi Tech 37, n.º 3 (16 de septiembre de 2019): 625–39. http://dx.doi.org/10.1108/lht-04-2018-0046.
Texto completoWidodo, Rio y Imam Riadi. "Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques". Buletin Ilmiah Sarjana Teknik Elektro 3, n.º 1 (13 de enero de 2021): 21. http://dx.doi.org/10.12928/biste.v3i1.1752.
Texto completoInman, D., D. Simidchiev y P. Jeffrey. "Elicitation of expert knowledge to develop decision support tools for use in water demand management planning". Water Supply 7, n.º 5-6 (1 de diciembre de 2007): 53–60. http://dx.doi.org/10.2166/ws.2007.110.
Texto completoSadikin, Fal y Nuruddin Wiranda. "ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION". Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, n.º 1 (30 de abril de 2023): 7–16. http://dx.doi.org/10.20527/jtiulm.v8i1.152.
Texto completoNazir, Anjum, Zulfiqar Memon, Touseef Sadiq, Hameedur Rahman y Inam Ullah Khan. "A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection". Sensors 23, n.º 19 (28 de septiembre de 2023): 8153. http://dx.doi.org/10.3390/s23198153.
Texto completoMatthijs, Koen y Paul Puschmann. "Editorial". Historical Life Course Studies 2 (11 de mayo de 2015): 37. http://dx.doi.org/10.51964/hlcs9357.
Texto completoDulanovic, Nenad, Dane Hinic y Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure". Yugoslav Journal of Operations Research 18, n.º 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Texto completoHulsen, Tim. "BioVenn – an R and Python package for the comparison and visualization of biological lists using area-proportional Venn diagrams". Data Science 4, n.º 1 (21 de mayo de 2021): 51–61. http://dx.doi.org/10.3233/ds-210032.
Texto completoSadikin, Fal y Nuruddin Wiranda. "INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES". Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, n.º 1 (30 de abril de 2023): 23–30. http://dx.doi.org/10.20527/jtiulm.v8i1.153.
Texto completoHuh, Jun-Ho. "Implementation of lightweight intrusion detection model for security of smart green house and vertical farm". International Journal of Distributed Sensor Networks 14, n.º 4 (abril de 2018): 155014771876763. http://dx.doi.org/10.1177/1550147718767630.
Texto completoHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne y Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection". Electronics 9, n.º 10 (14 de octubre de 2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Texto completoChalichalamala, Silpa, Niranjana Govindan y Ramani Kasarapu. "Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things". Sensors 23, n.º 23 (3 de diciembre de 2023): 9583. http://dx.doi.org/10.3390/s23239583.
Texto completoAlamsyah, Nur. "ENHANCING INTRUSION DETECTION SYSTEM ON NODEMCU WITH ENSEMBLE VOTING". Jurnal Elektro dan Telekomunikasi Terapan 9, n.º 2 (6 de marzo de 2023): 1271. http://dx.doi.org/10.25124/jett.v9i2.5437.
Texto completoBerenice Arzate-Rueda, Enrique Reyes-Archundia, Juan C. Olivares-Rojas, Jose A. Gutiérrez-Gnecchi, Maria del C. García-Ramírez, Marco V. Chávez-Báez y Javier A. Rodríguez-Herrejón. "Intrusion detection system in a hardware in the loop scenario". Global Journal of Engineering and Technology Advances 17, n.º 3 (30 de diciembre de 2023): 036–44. http://dx.doi.org/10.30574/gjeta.2023.17.3.0247.
Texto completoKonyeha, Susan y Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)". Advanced Materials Research 824 (septiembre de 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Texto completoPinuji, Sukmo. "INTEGRASI SISTEM INFORMASI PERTANAHAN DAN INFRASTRUKTUR DATA SPASIAL DALAM RANGKA PERWUJUDAN ONE MAP POLICY". BHUMI: Jurnal Agraria dan Pertanahan 2, n.º 1 (31 de mayo de 2016): 48. http://dx.doi.org/10.31292/jb.v2i1.31.
Texto completoMacIntosh, Eric, A. Lauren Couture y Kirsty Spence. "Management challenges in delivering an international sport and development program". Sport, Business and Management: An International Journal 5, n.º 3 (13 de julio de 2015): 276–96. http://dx.doi.org/10.1108/sbm-07-2012-0028.
Texto completoGhori, Muhammad Rizwan, Tat-Chee Wan y Gian Chand Sodhy. "Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols". Sensors 20, n.º 12 (25 de junio de 2020): 3590. http://dx.doi.org/10.3390/s20123590.
Texto completo