ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Hybrid Approach for Real-Time Network Intrusion Detection Systems
2007 International Conference on Computational Intelligence and Security (CIS 2007)
◽
10.1109/cis.2007.10
◽
2007
◽
Cited By ~ 4
Author(s):
Sang Min Lee
◽
Dong Seong Kim
◽
Jong Sou Park
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Hybrid Approach
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Related Documents
Cited By
References
A STUDY: NETWORK INTRUSION DETECTION SYSTEMS IN REAL TIME ENVIRONMENTS
Journal of Xidian University
◽
10.37896/jxu14.5/061
◽
2020
◽
Vol 14
(5)
◽
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Minimal dataset for Network Intrusion Detection Systems via MID-PCA: A hybrid approach
2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS
◽
10.1109/is.2012.6335176
◽
2012
◽
Cited By ~ 2
Author(s):
Jean-Pierre Nziga
◽
James Cannady
Keyword(s):
Intrusion Detection
◽
Hybrid Approach
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
◽
10.1109/waina.2008.69
◽
2008
◽
Cited By ~ 3
Author(s):
Ming-Yang Su
◽
Sheng-Cheng Yeh
◽
Kai-Chi Chang
◽
Hua-Fu Wei
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Fuzzy Rules
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Incremental Mining
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An Approach to Reduce Uncertainty Problem in Network Intrusion Detection Systems
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)
◽
10.1109/iciis51140.2020.9342634
◽
2020
◽
Author(s):
Gargi Kadam
◽
Sahil Parekh
◽
Priyanka Agnihotri
◽
Dayanand Ambawade
◽
Prasenjit Bhavathankar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Predicting the resource consumption of network intrusion detection systems
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '08
◽
10.1145/1375457.1375509
◽
2008
◽
Cited By ~ 7
Author(s):
Holger Dreger
◽
Anja Feldmann
◽
Vern Paxson
◽
Robin Sommer
Keyword(s):
Intrusion Detection
◽
Resource Consumption
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors
Algorithms
◽
10.3390/a10020058
◽
2017
◽
Vol 10
(2)
◽
pp. 58
◽
Cited By ~ 1
Author(s):
◽
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Matching Algorithm
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Pattern Matching Algorithm
Download Full-text
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289869
◽
2020
◽
Author(s):
Mohammad J. Hashemi
◽
Eric Keller
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems
10.1145/3486001.3486231
◽
2021
◽
Author(s):
Suresh Kumar Amalapuram
◽
Thushara Tippi Reddy
◽
Sumohana S. Channappayya
◽
Bheemarjuna Reddy Tamma
Keyword(s):
Intrusion Detection
◽
Class Imbalance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Continual Learning
Download Full-text
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
IEEE Journal on Selected Areas in Communications
◽
10.1109/jsac.2006.877131
◽
2006
◽
Vol 24
(10)
◽
pp. 1781-1792
◽
Cited By ~ 99
Author(s):
S. Dharmapurikar
◽
J.W. Lockwood
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
Proceedings of ICETIT 2019 - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-030-30577-2_84
◽
2019
◽
pp. 949-960
Author(s):
Neha Gupta
◽
Punam Bedi
◽
Vinita Jindal
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Learning Algorithms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Activation Functions
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close