ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A real-time risk assessment model for intrusion detection systems
2017 International Symposium on Networks, Computers and Communications (ISNCC)
◽
10.1109/isncc.2017.8071990
◽
2017
◽
Cited By ~ 2
Author(s):
El Mostapha Chakir
◽
Mohamed Moughit
◽
Youness Idrissi Khamlichi
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
Real Time
◽
Assessment Model
◽
Intrusion Detection Systems
◽
Risk Assessment Model
◽
Detection Systems
Download Full-text
Related Documents
Cited By
References
A Real-Time Risk Assessment Model for Intrusion Detection Systems Using Pattern Matching
International Conference on Information Technology and Communication Systems - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-319-64719-7_20
◽
2017
◽
pp. 229-237
Author(s):
El Mostapha Chakir
◽
Mohamed Moughit
◽
Youness Idrissi Khamlichi
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
Real Time
◽
Pattern Matching
◽
Assessment Model
◽
Intrusion Detection Systems
◽
Risk Assessment Model
◽
Detection Systems
Download Full-text
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems
Computational Intelligence and Security - Lecture Notes in Computer Science
◽
10.1007/11596981_57
◽
2005
◽
pp. 388-397
◽
Cited By ~ 17
Author(s):
André Årnes
◽
Karin Sallhammar
◽
Kjetil Haslum
◽
Tønnes Brekne
◽
Marie Elisabeth Gaup Moe
◽
...
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Performance Adaptation in Real-Time Intrusion Detection Systems
Lecture Notes in Computer Science - Recent Advances in Intrusion Detection
◽
10.1007/3-540-36084-0_14
◽
2002
◽
pp. 252-273
◽
Cited By ~ 31
Author(s):
Wenke Lee
◽
João B. D. Cabrera
◽
Ashley Thomas
◽
Niranjan Balwalli
◽
Sunmeet Saluja
◽
...
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Performance Adaptation
Download Full-text
A STUDY: NETWORK INTRUSION DETECTION SYSTEMS IN REAL TIME ENVIRONMENTS
Journal of Xidian University
◽
10.37896/jxu14.5/061
◽
2020
◽
Vol 14
(5)
◽
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Real time dataset generation framework for intrusion detection systems in IoT
Future Generation Computer Systems
◽
10.1016/j.future.2020.02.051
◽
2020
◽
Vol 108
◽
pp. 414-423
◽
Cited By ~ 6
Author(s):
Yahya Al-Hadhrami
◽
Farookh Khadeer Hussain
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Risk Assessment and Alert Prioritization for Intrusion Detection Systems
Ubiquitous Networking - Lecture Notes in Computer Science
◽
10.1007/978-3-319-68179-5_56
◽
2017
◽
pp. 641-655
Author(s):
El Mostapha Chakir
◽
Mohamed Moughit
◽
Youness Idrissi Khamlichi
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Real-time malware detection framework in intrusion detection systems
Proceedings of the 2013 Research in Adaptive and Convergent Systems on - RACS '13
◽
10.1145/2513228.2513297
◽
2013
◽
Author(s):
SunWoo Kim
◽
TaeGuen Kim
◽
Eul Gyu Im
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Malware Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
RBF-based real-time hierarchical intrusion detection systems
Proceedings of the International Joint Conference on Neural Networks, 2003.
◽
10.1109/ijcnn.2003.1223922
◽
2004
◽
Cited By ~ 8
Author(s):
Ju Jiang
◽
Chunlin Zhang
◽
M. Kamel
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Performance investigation of real-time fiber optic perimeter intrusion detection systems using event classification
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678690
◽
2010
◽
Cited By ~ 6
Author(s):
Seedahmed S. Mahmoud
◽
Jim Katsifolis
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Fiber Optic
◽
Intrusion Detection Systems
◽
Event Classification
◽
Detection Systems
Download Full-text
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
◽
10.1109/waina.2008.69
◽
2008
◽
Cited By ~ 3
Author(s):
Ming-Yang Su
◽
Sheng-Cheng Yeh
◽
Kai-Chi Chang
◽
Hua-Fu Wei
Keyword(s):
Intrusion Detection
◽
Real Time
◽
Fuzzy Rules
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Incremental Mining
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close