EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"detection system"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 12 Datensicherheit 12 Artificial intelligence 11 Künstliche Intelligenz 11 intrusion detection system 10 IDS 8 Intrusion Detection System 7 Intrusion detection system 6 Neural networks 6 Neuronale Netze 6 Algorithm 5 Algorithmus 5 Intrusion Detection System (IDS) 5 Theorie 5 Theory 5 Cloud Computing 4 Internet der Dinge 4 Internet of things 4 Machine learning 4 Security 4 Anomaly Detection 3 Classification 3 Data Mining 3 Data mining 3 Internet of Things 3 Klassifikation 3 Agent 2 Business network 2 Cloud computing 2 Firewall 2 Lieferkette 2 MANET 2 Mathematical programming 2 Mathematische Optimierung 2 NSL-KDD Dataset 2 Probe 2 RFID 2 Supply chain 2 Unternehmensnetzwerk 2 auditing 2
more ... less ...
Online availability
All
Undetermined 25 Free 7 CC license 4
Type of publication
All
Article 36 Book / Working Paper 2
Type of publication (narrower categories)
All
Article in journal 22 Aufsatz in Zeitschrift 22 Working Paper 1 research-article 1 review 1
Language
All
English 38
Author
All
El Haj Chehade, Eva 2 Ghosh, Partha 2 Kesswani, Nishtha 2 Phadikar, Santanu 2 Schiller, Jörg 2 Vishwakarma, Monika 2 Abdussami, Aftab Alam 1 Adeniran, Olusola 1 Ahmim, Ahmed 1 Amine, Abdelmalek 1 Arogundade, Oluwasefunmi ‘Tale 1 Athavale, Nachiket 1 Barde, S. S. 1 Bardhan, Meghna 1 Barik, Ram Chandra 1 Basavaraju, Poornima 1 Ben Ayed, Rahma 1 Ben Saad, Leila 1 Bera, Anupam 1 Biswal, Anil Kumar 1 Boudia, Mohamed Amine 1 Buri, R. Kiruba 1 Cai, Chuanxi 1 Chaudhari, Bhushan S. 1 Chaudhary, Vikash 1 Chavan, Jatin 1 Chowdhury, Nilabhra Roy 1 Christ, Andreas 1 De Sarkar, Nivedita Ray 1 De, Mou 1 Deepalakshmi, P. 1 Deshpande, Shubham 1 Dewan, Prerna 1 Dixit, Mrudul 1 Dutta, Kamlesh 1 Erothi, Uma Shankar 1 Farooqui, Mohammed Faizan 1 Ferrag, Mohamed Amine 1 Gara, Fatma 1 Ghoualmi Zine, Nacira 1
more ... less ...
Institution
All
Fachbereich Betriebswirtschaftslehre, Universität Hamburg 1
Published in...
All
Decision analytics journal 4 International journal of networking and virtual organisations : IJNVO 4 Information technology and management 2 International Journal of Synthetic Emotions (IJSE) 2 International journal of enterprise network management 2 Journal of information & knowledge management : JIKM 2 Working Papers on Risk and Insurance 2 Business ethics and leadership : BEL 1 Global review of business and economic research 1 IEEE transactions on engineering management : EM 1 Information & Computer Security 1 International Journal of Cloud Applications and Computing (IJCAC) 1 International Journal of Green Computing (IJGC) 1 International Journal of Handheld Computing Research (IJHCR) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Information System Modeling and Design (IJISMD) 1 International Journal of Natural Computing Research (IJNCR) 1 International Journal of Open Source Software and Processes (IJOSSP) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International Journal of Secure Software Engineering (IJSSE) 1 International Journal on Semantic Web and Information Systems (IJSWIS) 1 International journal of e-entrepreneurship and innovation : IJEEI ; an official publication of the Information Resources Management Association 1 International journal of economics 1 International journal of enterprise network management : IJENM 1 International journal of intelligent enterprise 1 Journal of forecasting 1 Online Information Review 1
more ... less ...
Source
All
ECONIS (ZBW) 22 Other ZBW resources 14 EconStor 1 RePEc 1
Showing 21 - 30 of 38
Cover Image
An anomaly-based network intrusion detection system using ensemble clustering
Jackins, V.; Punithavathani, D. Shalini - In: International journal of enterprise network management 9 (2018) 3/4, pp. 251-260
Persistent link: https://www.econbiz.de/10011970952
Saved in:
Cover Image
Agent Based Noise Detection Using Real Time Data Analysis Towards Green Environment
De Sarkar, Nivedita Ray; Kundu, Anirban; De, Mou; Bera, … - In: International Journal of Green Computing (IJGC) 8 (2017) 2, pp. 37-58
The authors propose an agent-based noise detection system based on Internet of Things (IOT) for handling abnormality in …
Persistent link: https://www.econbiz.de/10012044936
Saved in:
Cover Image
IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment
Phadikar, Santanu; Ghosh, Partha; Bardhan, Meghna; … - In: International Journal of Information System Modeling … 8 (2017) 4, pp. 21-37
efficient intrusion detection system (IDS) is required. In this article, an effective and efficient IDS is proposed to maintain …
Persistent link: https://www.econbiz.de/10012045654
Saved in:
Cover Image
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees
Amine, Abdelmalek; Hamou, Reda Mohamed; Boudia, Mohamed … - In: International Journal of Information Security and … 11 (2017) 1, pp. 18-34
In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the …
Persistent link: https://www.econbiz.de/10012045686
Saved in:
Cover Image
Network Traffic Intrusion Detection System Using Fuzzy Logic and Neural Network
Dixit, Mrudul; Ukarande, Rajashwini - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 1, pp. 1-17
Intrusion Detection System (IDS) are actively used to identify any unusual activities in a network. To improve the … network and other such AI techniques. This article presents an intrusion detection system in network based on fuzzy logic and …
Persistent link: https://www.econbiz.de/10012047565
Saved in:
Cover Image
Framework for Threat Analysis and Attack Modelling of Network Security Protocols
Athavale, Nachiket; Deshpande, Shubham; Chaudhary, Vikash; … - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 2, pp. 62-75
signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator …
Persistent link: https://www.econbiz.de/10012047574
Saved in:
Cover Image
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
Gara, Fatma; Ben Saad, Leila; Ben Ayed, Rahma - In: International Journal on Semantic Web and Information … 13 (2017) 3, pp. 22-47
, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary … to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6 … evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power …
Persistent link: https://www.econbiz.de/10012048265
Saved in:
Cover Image
Internet attacks and intrusion detection system : A review of the literature
Singh, Raman; Kumar, Harish; Singla, Ravinder Kumar; … - In: Online Information Review 41 (2017) 2, pp. 171-184
Purpose The paper addresses various cyber threats and their effects on the internet. A review of the literature on intrusion detection systems (IDSs) as a means of mitigating internet attacks is presented, and gaps in the research are identified. The purpose of this paper is to identify the...
Persistent link: https://www.econbiz.de/10014967251
Saved in:
Cover Image
An intelligent network algorithm for enhanced security in a mobile ad hoc network
Roopa, M.; Raja, S. Selvakumar - In: International journal of networking and virtual … 17 (2017) 2/3, pp. 126-136
Persistent link: https://www.econbiz.de/10011825138
Saved in:
Cover Image
A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule
Ghosh, Partha; Shakti, Shivam; Phadikar, Santanu - In: International Journal of Cloud Applications and … 6 (2016) 4, pp. 18-35
Cloud environment from such intruders an Intrusion Detection System (IDS) is required. In this paper the authors have …
Persistent link: https://www.econbiz.de/10012043362
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...