Статті в журналах з теми "IDS IMPLEMENTATION"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "IDS IMPLEMENTATION".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Tarkhan, Mahdi, Saeed Bagheri Shouraki, and Seyed Hossein Khasteh. "A novel hardware implementation of IDS method." IEICE Electronics Express 6, no. 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Повний текст джерелаPaul, Morgan. "Looking to the Future." Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, no. 1 (September 8, 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.
Повний текст джерелаMizutani, Masayoshi, Shin Shirahata, Masaki Minami, and Jun Murai. "The design and implementation of session-based IDS." Electronics and Communications in Japan (Part I: Communications) 89, no. 3 (March 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.
Повний текст джерелаBush-Mecenas, Susan, Julie A. Marsh, and Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform." Teachers College Record: The Voice of Scholarship in Education 122, no. 10 (October 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.
Повний текст джерелаMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki, and Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method." IEEE Transactions on Fuzzy Systems 19, no. 6 (December 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Повний текст джерелаBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss, and Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Повний текст джерелаBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon, and David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies." Antibiotics 9, no. 12 (November 27, 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.
Повний текст джерелаMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (March 31, 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Повний текст джерелаKim, Song-Mok, and Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano." Journal of Digital Contents Society 24, no. 11 (November 30, 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Повний текст джерелаSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Повний текст джерелаOtoum, Safa, Burak Kantarci, and Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures." ACM Transactions on Internet Technology 21, no. 4 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Повний текст джерелаHa, Jaecheol. "Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network." Journal of the Korea Institute of Information Security and Cryptology 26, no. 5 (October 31, 2016): 1313–22. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1313.
Повний текст джерелаDewi Paramitha, Ida Ayu Shinta, Gusti Made Arya Sasmita, and I. Made Sunia Raharja. "Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means." Majalah Ilmiah Teknologi Elektro 19, no. 1 (October 15, 2020): 95. http://dx.doi.org/10.24843/mite.2020.v19i01.p14.
Повний текст джерелаAgarwal, Nancy, and Syed Zeeshan Hussain. "A Closer Look at Intrusion Detection System for Web Applications." Security and Communication Networks 2018 (August 14, 2018): 1–27. http://dx.doi.org/10.1155/2018/9601357.
Повний текст джерелаRyan, Nessa E., Bernadette Boden-Albala, Gabriel Ganyaglo, and Alison El Ayadi. "4112 Tools for Self-Management of Obstetric Fistula in Low and Middle-income Countries: A Qualitative Study Exploring Pre-implementation Barriers and Facilitators among Global Stakeholders." Journal of Clinical and Translational Science 4, s1 (June 2020): 149–50. http://dx.doi.org/10.1017/cts.2020.440.
Повний текст джерелаKim, Youbin, and Jaehwan Lee. "Implementation Guide and Evaluation of IAP Process for Convergence Product Design." Journal of Industrial Design Studies 51 (March 31, 2020): 45–52. http://dx.doi.org/10.37254/ids.2020.03.51.05.45.
Повний текст джерелаPietro Spadaccino and Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing." ITU Journal on Future and Evolving Technologies 3, no. 2 (September 22, 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Повний текст джерелаMudaranthakam, Dinesh Pal, Colin Cernik, Leslie Curtis, Blake Griffith, Jinxiang Hu, Jo Wick, Jeffrey Thompson, et al. "Utilization of Technology to Improve Efficiency in Investigational Drug Management Processes." Journal of Pharmacy Technology 36, no. 2 (January 22, 2020): 84–90. http://dx.doi.org/10.1177/8755122519900049.
Повний текст джерелаMahbooba, Basim, Radhya Sahal, Wael Alosaimi, and Martin Serrano. "Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models." Complexity 2021 (March 8, 2021): 1–23. http://dx.doi.org/10.1155/2021/5538896.
Повний текст джерелаLeBrón, Alana M. W., Keta Cowan, William D. Lopez, Nicole L. Novak, Maria Ibarra-Frayre, and Jorge Delva. "The Washtenaw ID Project: A Government-Issued ID Coalition Working Toward Social, Economic, and Racial Justice and Health Equity." Health Education & Behavior 46, no. 1_suppl (September 24, 2019): 53S—61S. http://dx.doi.org/10.1177/1090198119864078.
Повний текст джерелаLodhi, Mala Bharti, Vineet Richhariya, and Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET." International Journal of Research -GRANTHAALAYAH 2, no. 3 (December 31, 2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Повний текст джерелаLatifi, Zeinab, Kamal Jamshidi, and Ali Bohlooli. "Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing." International Journal of Computer Network and Information Security 5, no. 10 (August 1, 2013): 30–36. http://dx.doi.org/10.5815/ijcnis.2013.10.05.
Повний текст джерелаSammon, Cormac J., Thomas P. Leahy, and Sreeram Ramagopalan. "Nonindependence of patient data in the clinical practice research datalink: a case study in atrial fibrillation patients." Journal of Comparative Effectiveness Research 9, no. 6 (April 2020): 395–403. http://dx.doi.org/10.2217/cer-2019-0191.
Повний текст джерелаBilyeu, Heather, Jon Washburn, Lacey Vermette, and Tracy Klug. "Validation and Implementation of a Highly Sensitive and Efficient Newborn Screening Assay for Mucopolysaccharidosis Type II." International Journal of Neonatal Screening 6, no. 4 (October 14, 2020): 79. http://dx.doi.org/10.3390/ijns6040079.
Повний текст джерелаWei, Shugong. "Implementation and evaluation of a laser scan localization scheme for sensor nodes." Sensor Review 40, no. 1 (January 13, 2020): 97–106. http://dx.doi.org/10.1108/sr-08-2019-0210.
Повний текст джерелаNikoloudakis, Yannis, Ioannis Kefaloukos, Stylianos Klados, Spyros Panagiotakis, Evangelos Pallis, Charalabos Skianis, and Evangelos K. Markakis. "Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation." Sensors 21, no. 14 (July 20, 2021): 4939. http://dx.doi.org/10.3390/s21144939.
Повний текст джерелаEsterline, Albert, and Sridhar Kota. "A general paradigm for routine design—theory and implementation." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 6, no. 2 (May 1992): 73–93. http://dx.doi.org/10.1017/s0890060400002973.
Повний текст джерелаSlamet, Slamet, and Izzeldin Ibrahim Mohamed Abdelaziz. "An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm." Bulletin of Electrical Engineering and Informatics 11, no. 2 (April 1, 2022): 1018–25. http://dx.doi.org/10.11591/eei.v11i2.3308.
Повний текст джерелаHousman, Ian, Robert Chastain, and Mark Finco. "An Evaluation of Forest Health Insect and Disease Survey Data and Satellite-Based Remote Sensing Forest Change Detection Methods: Case Studies in the United States." Remote Sensing 10, no. 8 (July 27, 2018): 1184. http://dx.doi.org/10.3390/rs10081184.
Повний текст джерелаPurnama, Tommy, Yusuf Muhyidin, and Dayan Singasatia. "IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) SNORT SEBAGAI SISTEM KEAMANAN MENGGUNAKAN WHATSAPP DAN TELEGRAM SEBAGAI MEDIA NOTIFIKASI." JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI 14, no. 2 (September 1, 2023): 358–69. http://dx.doi.org/10.51903/jtikp.v14i2.726.
Повний текст джерелаReddy, N. Chandra Sekhar. "An Implementation of Novel Feature Subset Selection Algorithm for IDS in Mobile Networks." International Journal of Advanced Trends in Computer Science and Engineering 8, no. 5 (October 15, 2019): 2132–41. http://dx.doi.org/10.30534/ijatcse/2019/43852019.
Повний текст джерелаPuschmann, Paul, and Luciana Quaranta. "Editorial." Historical Life Course Studies 5 (January 11, 2018): 1–2. http://dx.doi.org/10.51964/hlcs9333.
Повний текст джерелаPowell, James, Carol Hoover, Andrew Gordon, and Michelle Mittrach. "Bridging identity challenges: why and how one library plugged ORCiD into their enterprise." Library Hi Tech 37, no. 3 (September 16, 2019): 625–39. http://dx.doi.org/10.1108/lht-04-2018-0046.
Повний текст джерелаWidodo, Rio, and Imam Riadi. "Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 1 (January 13, 2021): 21. http://dx.doi.org/10.12928/biste.v3i1.1752.
Повний текст джерелаInman, D., D. Simidchiev, and P. Jeffrey. "Elicitation of expert knowledge to develop decision support tools for use in water demand management planning." Water Supply 7, no. 5-6 (December 1, 2007): 53–60. http://dx.doi.org/10.2166/ws.2007.110.
Повний текст джерелаSadikin, Fal, and Nuruddin Wiranda. "ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, no. 1 (April 30, 2023): 7–16. http://dx.doi.org/10.20527/jtiulm.v8i1.152.
Повний текст джерелаNazir, Anjum, Zulfiqar Memon, Touseef Sadiq, Hameedur Rahman, and Inam Ullah Khan. "A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection." Sensors 23, no. 19 (September 28, 2023): 8153. http://dx.doi.org/10.3390/s23198153.
Повний текст джерелаMatthijs, Koen, and Paul Puschmann. "Editorial." Historical Life Course Studies 2 (May 11, 2015): 37. http://dx.doi.org/10.51964/hlcs9357.
Повний текст джерелаDulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Повний текст джерелаHulsen, Tim. "BioVenn – an R and Python package for the comparison and visualization of biological lists using area-proportional Venn diagrams." Data Science 4, no. 1 (May 21, 2021): 51–61. http://dx.doi.org/10.3233/ds-210032.
Повний текст джерелаSadikin, Fal, and Nuruddin Wiranda. "INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 8, no. 1 (April 30, 2023): 23–30. http://dx.doi.org/10.20527/jtiulm.v8i1.153.
Повний текст джерелаHuh, Jun-Ho. "Implementation of lightweight intrusion detection model for security of smart green house and vertical farm." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771876763. http://dx.doi.org/10.1177/1550147718767630.
Повний текст джерелаHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection." Electronics 9, no. 10 (October 14, 2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Повний текст джерелаChalichalamala, Silpa, Niranjana Govindan, and Ramani Kasarapu. "Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things." Sensors 23, no. 23 (December 3, 2023): 9583. http://dx.doi.org/10.3390/s23239583.
Повний текст джерелаAlamsyah, Nur. "ENHANCING INTRUSION DETECTION SYSTEM ON NODEMCU WITH ENSEMBLE VOTING." Jurnal Elektro dan Telekomunikasi Terapan 9, no. 2 (March 6, 2023): 1271. http://dx.doi.org/10.25124/jett.v9i2.5437.
Повний текст джерелаBerenice Arzate-Rueda, Enrique Reyes-Archundia, Juan C. Olivares-Rojas, Jose A. Gutiérrez-Gnecchi, Maria del C. García-Ramírez, Marco V. Chávez-Báez, and Javier A. Rodríguez-Herrejón. "Intrusion detection system in a hardware in the loop scenario." Global Journal of Engineering and Technology Advances 17, no. 3 (December 30, 2023): 036–44. http://dx.doi.org/10.30574/gjeta.2023.17.3.0247.
Повний текст джерелаKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Повний текст джерелаPinuji, Sukmo. "INTEGRASI SISTEM INFORMASI PERTANAHAN DAN INFRASTRUKTUR DATA SPASIAL DALAM RANGKA PERWUJUDAN ONE MAP POLICY." BHUMI: Jurnal Agraria dan Pertanahan 2, no. 1 (May 31, 2016): 48. http://dx.doi.org/10.31292/jb.v2i1.31.
Повний текст джерелаMacIntosh, Eric, A. Lauren Couture, and Kirsty Spence. "Management challenges in delivering an international sport and development program." Sport, Business and Management: An International Journal 5, no. 3 (July 13, 2015): 276–96. http://dx.doi.org/10.1108/sbm-07-2012-0028.
Повний текст джерелаGhori, Muhammad Rizwan, Tat-Chee Wan, and Gian Chand Sodhy. "Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols." Sensors 20, no. 12 (June 25, 2020): 3590. http://dx.doi.org/10.3390/s20123590.
Повний текст джерела