EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Intrusion detection system"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 12 Datensicherheit 12 Artificial intelligence 10 Künstliche Intelligenz 10 intrusion detection system 10 IDS 8 Intrusion Detection System 7 Intrusion detection system 6 Neural networks 6 Neuronale Netze 6 Intrusion Detection System (IDS) 5 Theorie 5 Theory 5 Algorithm 4 Algorithmus 4 Cloud Computing 4 Internet der Dinge 4 Internet of things 4 Anomaly Detection 3 Classification 3 Internet of Things 3 Klassifikation 3 Machine learning 3 Security 3 Business network 2 Cloud computing 2 Data Mining 2 Data mining 2 Firewall 2 Lieferkette 2 MANET 2 Mathematical programming 2 Mathematische Optimierung 2 NSL-KDD Dataset 2 Probe 2 RFID 2 Supply chain 2 Unternehmensnetzwerk 2 deep learning 2 feature selection 2
more ... less ...
Online availability
All
Undetermined 24 CC license 3 Free 3
Type of publication
All
Article 33
Type of publication (narrower categories)
All
Article in journal 20 Aufsatz in Zeitschrift 20 research-article 1 review 1
Language
All
English 33
Author
All
El Haj Chehade, Eva 2 Ghosh, Partha 2 Kesswani, Nishtha 2 Phadikar, Santanu 2 Vishwakarma, Monika 2 Abdussami, Aftab Alam 1 Adeniran, Olusola 1 Ahmim, Ahmed 1 Amine, Abdelmalek 1 Arogundade, Oluwasefunmi ‘Tale 1 Athavale, Nachiket 1 Barde, S. S. 1 Bardhan, Meghna 1 Barik, Ram Chandra 1 Basavaraju, Poornima 1 Ben Ayed, Rahma 1 Ben Saad, Leila 1 Biswal, Anil Kumar 1 Boudia, Mohamed Amine 1 Buri, R. Kiruba 1 Cai, Chuanxi 1 Chaudhari, Bhushan S. 1 Chaudhary, Vikash 1 Chavan, Jatin 1 Chowdhury, Nilabhra Roy 1 Christ, Andreas 1 Deepalakshmi, P. 1 Deshpande, Shubham 1 Dewan, Prerna 1 Dixit, Mrudul 1 Dutta, Kamlesh 1 Erothi, Uma Shankar 1 Farooqui, Mohammed Faizan 1 Ferrag, Mohamed Amine 1 Gara, Fatma 1 Ghoualmi Zine, Nacira 1 Hamou, Reda Mohamed 1 Illuri, Babu 1 Iqbal, Hena 1 Jackins, V. 1
more ... less ...
Published in...
All
International journal of networking and virtual organisations : IJNVO 4 Decision analytics journal 3 Information technology and management 2 International Journal of Synthetic Emotions (IJSE) 2 International journal of enterprise network management 2 Journal of information & knowledge management : JIKM 2 Global review of business and economic research 1 IEEE transactions on engineering management : EM 1 Information & Computer Security 1 International Journal of Cloud Applications and Computing (IJCAC) 1 International Journal of Handheld Computing Research (IJHCR) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Information System Modeling and Design (IJISMD) 1 International Journal of Natural Computing Research (IJNCR) 1 International Journal of Open Source Software and Processes (IJOSSP) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International Journal of Secure Software Engineering (IJSSE) 1 International Journal on Semantic Web and Information Systems (IJSWIS) 1 International journal of e-entrepreneurship and innovation : IJEEI ; an official publication of the Information Resources Management Association 1 International journal of economics 1 International journal of enterprise network management : IJENM 1 International journal of intelligent enterprise 1 Journal of forecasting 1 Online Information Review 1
more ... less ...
Source
All
ECONIS (ZBW) 20 Other ZBW resources 13
Showing 21 - 30 of 33
Cover Image
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees
Amine, Abdelmalek; Hamou, Reda Mohamed; Boudia, Mohamed … - In: International Journal of Information Security and … 11 (2017) 1, pp. 18-34
In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the …
Persistent link: https://www.econbiz.de/10012045686
Saved in:
Cover Image
Network Traffic Intrusion Detection System Using Fuzzy Logic and Neural Network
Dixit, Mrudul; Ukarande, Rajashwini - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 1, pp. 1-17
Intrusion Detection System (IDS) are actively used to identify any unusual activities in a network. To improve the … network and other such AI techniques. This article presents an intrusion detection system in network based on fuzzy logic and …
Persistent link: https://www.econbiz.de/10012047565
Saved in:
Cover Image
Framework for Threat Analysis and Attack Modelling of Network Security Protocols
Athavale, Nachiket; Deshpande, Shubham; Chaudhary, Vikash; … - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 2, pp. 62-75
signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator …
Persistent link: https://www.econbiz.de/10012047574
Saved in:
Cover Image
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
Gara, Fatma; Ben Saad, Leila; Ben Ayed, Rahma - In: International Journal on Semantic Web and Information … 13 (2017) 3, pp. 22-47
, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary … to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6 … evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power …
Persistent link: https://www.econbiz.de/10012048265
Saved in:
Cover Image
Internet attacks and intrusion detection system : A review of the literature
Singh, Raman; Kumar, Harish; Singla, Ravinder Kumar; … - In: Online Information Review 41 (2017) 2, pp. 171-184
Purpose The paper addresses various cyber threats and their effects on the internet. A review of the literature on intrusion detection systems (IDSs) as a means of mitigating internet attacks is presented, and gaps in the research are identified. The purpose of this paper is to identify the...
Persistent link: https://www.econbiz.de/10014967251
Saved in:
Cover Image
An intelligent network algorithm for enhanced security in a mobile ad hoc network
Roopa, M.; Raja, S. Selvakumar - In: International journal of networking and virtual … 17 (2017) 2/3, pp. 126-136
Persistent link: https://www.econbiz.de/10011825138
Saved in:
Cover Image
A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule
Ghosh, Partha; Shakti, Shivam; Phadikar, Santanu - In: International Journal of Cloud Applications and … 6 (2016) 4, pp. 18-35
Cloud environment from such intruders an Intrusion Detection System (IDS) is required. In this paper the authors have …
Persistent link: https://www.econbiz.de/10012043362
Saved in:
Cover Image
Securing Mobile Ad Hoc Networks: Challenges and Solutions
Kumar, Sunil; Dutta, Kamlesh - In: International Journal of Handheld Computing Research (IJHCR) 7 (2016) 1, pp. 26-76
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are...
Persistent link: https://www.econbiz.de/10012045152
Saved in:
Cover Image
Towards Ontological Approach to Security Risk Analysis of Information System: Model and Architecture
Arogundade, Oluwasefunmi ‘Tale; Adeniran, Olusola; … - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 3, pp. 1-25
Resource allocation decisions can be enhanced by performing risk assessment during the early development phase. In order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis model that can dynamically analyze threat data collected...
Persistent link: https://www.econbiz.de/10012048074
Saved in:
Cover Image
A new hierarchical intrusion detection system based on a binary tree of classifiers
Ahmim, Ahmed; Ghoualmi Zine, Nacira - In: Information & Computer Security 23 (2015) 1, pp. 31-57
Purpose – The purpose of this paper is to build a new hierarchical intrusion detection system (IDS) based on a binary …
Persistent link: https://www.econbiz.de/10014754703
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...