[1]
|
Network intrusion detection system: A survey on artificial intelligence‐based techniques
|
|
Expert Systems,
2022 |
|
|
[2]
|
Blockchain Capabilities in Defending Advanced Persistent Threats Using Correlation Technique and Hidden Markov Models (HMM)
|
|
… Security Technologies for …,
2021 |
|
|
[3]
|
Banking Transaction Considerations on Standardized Browser Architecture
|
|
Proceedings of International Conference on …,
2021 |
|
|
[4]
|
Aplicação do método conjunto Stacking do classificador Floresta de Caminhos Ótimos para o problema de detecção de intrusão.
|
|
2021 |
|
|
[5]
|
Cloud Virtualized Middlebox: An IDS
|
|
2021 |
|
|
[6]
|
Optimum-path forest stacking-based ensemble for intrusion detection
|
|
2021 |
|
|
[7]
|
Guidelines for the protection of computer crime threats in the industrial business
|
|
Academy of Strategic …,
2020 |
|
|
[8]
|
Internet of Things Intrusion Detection: A Deep Learning Approach
|
|
2020 |
|
|
[9]
|
Penerapan Intrusion Prevention System (Ips) Sebagai Pengamanan Dari Serangan Distributed Denial Of Service (Ddos)
|
|
2020 |
|
|
[10]
|
A Self organized threat intelligence architecture for intrusion detection systems
|
|
2020 |
|
|
[11]
|
Deep learning: enhancing the security of software-defined networks
|
|
2019 |
|
|
[12]
|
Kurumlar için siber güvenlik laboratuvarı altyapısının oluşturulması
|
|
2019 |
|
|
[13]
|
Análisis de la eficiencia de los IDS open source Suricata y Snort en las PYMES
|
|
2019 |
|
|
[14]
|
Detection techniques for Intrusion Detection System (IDS)
|
|
2019 |
|
|
[15]
|
MergedTrie: Efficient textual indexing
|
|
2019 |
|
|
[16]
|
Avaliação de sistemas de detecção de intrusão em uma rede acadêmica
|
|
2018 |
|
|
[17]
|
A Survey on Intrusion Detection System (IDS)
|
|
2018 |
|
|
[18]
|
Survey on intrusion detection system (IDS)
|
|
Int. J. Technol. Res. Manag.,
2018 |
|
|
[19]
|
Detection and Prevention Cyber-Attacks for Smart Buildings via Private Cloud Environment
|
|
2018 |
|
|
[20]
|
A survey on types of machine learning techniques in intrusion prevention systems
|
|
2017 |
|
|
[21]
|
Comparative Study on Firewall and Intrusion Detection System
|
|
2017 |
|
|
[22]
|
A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions
|
|
Biometric Security and Privacy,
2017 |
|
|
[23]
|
A machine-learning-based system for real-time advanced persistent threat detection and prediction
|
|
2017 |
|
|
[24]
|
Performance analysis of open source IDPS in virtual computing environment
|
|
2016 |
|
|
[25]
|
Asiakasjärjestelmien turvaaminen hyökkäyksenestojärjestelmällä
|
|
2016 |
|
|
[26]
|
DETECTING NETWORK INTRUSION BASED ON DATA MINING TECHNIQUES AND ITS APPLICATION FOR MEDICAL SENSOR NETWORK
|
|
2016 |
|
|
[27]
|
Anomaly detector for computer networks
|
|
2015/04/14/ |
|
|
[28]
|
Network access and admission restriction using traffic monitoring and vulnerability detection
|
|
2015 |
|
|
[29]
|
Information Security Systems Policy Violation: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[30]
|
Heuristic Intrusion Detection and Prevention System
|
|
2015 |
|
|
[31]
|
IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions
|
|
2015 |
|
|
[32]
|
REVIEW: PHISHING ATTACK DETECTION AND PREVENTION
|
|
2015 |
|
|
[33]
|
A Survey on Intrusion Detection and Prevention Systems
|
|
2014 |
|
|
[34]
|
Concurrency in Intrusion Detection Systems: A Study in F
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[35]
|
Detecção cega de tráfego malicioso através da variação temporal do maior autovalor
|
|
NULL
2014 |
|
|
[36]
|
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
|
|
Journal of Information Security,
2014 |
|
|
[37]
|
Intrusion Detection System Using Bayesian Network Modeling
|
|
Proceedings of the 13th European Conference on Cyber warefare and Security: ECCWS 2014. Academic Conferences Limited,
2014 |
|
|
[38]
|
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
|
|
database,
2014 |
|
|
[39]
|
Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
|
|
M Culhane,
2014 |
|
|
[40]
|
Implementation of Intrusion Detection and Prevention System Using JPCAP/WINPCAP
|
|
2014 |
|
|
[41]
|
A Trust Model Tolerating the Behavior of Malicious Users
|
|
2014 |
|
|
[42]
|
یک مدل اعتماد دارای تحملپذیری در برابر رفتار کاربران بدخواه
|
|
2014 |
|
|
[43]
|
Efficacy of Attack detection capability of IDPS based on it's deployment in wired and wireless environment
|
|
arXiv preprint arXiv:1304.5022,
2013 |
|
|
[44]
|
Survey on Machine Learning Techniques for Intrusion Detection Systems
|
|
International Journal of Advanced Research in Computer and Communication Engineering,
2013 |
|
|
[45]
|
A Plug in Implementation for Phishing Attacks Using C4. 5 Algorithm
|
|
International Journal of Recent Development in Engineering and Technology,
2013 |
|
|
[46]
|
A survey on machine learning techniques for intrusion detection systems
|
|
International Journal of Advanced Research in Computer and Communication Engineering,
2013 |
|
|
[47]
|
IPSFlow: Um framework para Sistema de Prevenção de Intrusão baseado em Redes Definidas por Software
|
|
2013 |
|
|
[48]
|
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
|
|
International Journal of Information Technology & Computer Science,
2013 |
|
|
[49]
|
A Study to investigate the possibility of using a decision-making model with IPS
|
|
F Najjar - ampublisher.com,
2012 |
|
|
[50]
|
A Study on Security Capability of IDPS
|
|
The Institute of Electronics Engineers of Korea - Computer and Information,
2012 |
|
|
[51]
|
II Workshop de Pesquisa Experimental da Internet do Futuro (WPEIF)
|
|
NULL
2012 |
|
|
[52]
|
PENCEGAHAN BRUTE FORCE AUTHENTICATION VIA PROTOKOL SSH (SECURE SHELL) MENGGUNAKAN METODE HOST BASED INTRUSION DETECTION SYSTEM (HIDS)
|
|
Konferensi Nasional Sistem Informasi,
2012 |
|
|
[53]
|
Ipsflow–uma proposta de sistema de preven?ao de intrusao baseado no framework openflow
|
|
III WPEIF-SBRC,
2012 |
|
|
[54]
|
A study of Methodologies used in Intrusion Detection and Prevention Systems (IDPS)
|
|
Southeastcon, 2012 Proceedings of IEEE,
2012 |
|
|
[55]
|
Survey on Intrusion Detection and Prevention System: A MANET Perspective
|
|
International Journal of Scientific & Engineering Research,
2012 |
|
|
[56]
|
Process Flow Features as a Host-Based Event Knowledge Representation
|
|
NULL
2012 |
|
|
[57]
|
A Study Of Methodologies Used In Intrusion Detection And Prevention Systems
|
|
2012 |
|
|
[58]
|
IPSFlow–uma proposta de IPS distribuído para captura e bloqueio seletivo de tráfego malicioso em redes definidas por software
|
|
Anais do XII Simpósio …,
2012 |
|
|
[59]
|
A study on network intrusion detection and prevention system current status and challenging issues
|
|
Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on. IET,
2011 |
|
|