ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems
2008 IEEE International Performance, Computing and Communications Conference
◽
10.1109/pccc.2008.4745080
◽
2008
◽
Cited By ~ 3
Author(s):
Sun-il Kim
◽
Nnamdi Nwanze
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Related Documents
Cited By
References
A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection Systems
Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management
◽
10.5220/0008113603220329
◽
2019
◽
Cited By ~ 1
Author(s):
Roberto Saia
◽
Salvatore Carta
◽
Diego Recupero
◽
Gianni Fenu
◽
Maria Stanciu
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Feature Space
◽
Detection Performance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An Approach to Reduce Uncertainty Problem in Network Intrusion Detection Systems
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)
◽
10.1109/iciis51140.2020.9342634
◽
2020
◽
Author(s):
Gargi Kadam
◽
Sahil Parekh
◽
Priyanka Agnihotri
◽
Dayanand Ambawade
◽
Prasenjit Bhavathankar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Predicting the resource consumption of network intrusion detection systems
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '08
◽
10.1145/1375457.1375509
◽
2008
◽
Cited By ~ 7
Author(s):
Holger Dreger
◽
Anja Feldmann
◽
Vern Paxson
◽
Robin Sommer
Keyword(s):
Intrusion Detection
◽
Resource Consumption
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors
Algorithms
◽
10.3390/a10020058
◽
2017
◽
Vol 10
(2)
◽
pp. 58
◽
Cited By ~ 1
Author(s):
◽
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Matching Algorithm
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Pattern Matching Algorithm
Download Full-text
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289869
◽
2020
◽
Author(s):
Mohammad J. Hashemi
◽
Eric Keller
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems
10.1145/3486001.3486231
◽
2021
◽
Author(s):
Suresh Kumar Amalapuram
◽
Thushara Tippi Reddy
◽
Sumohana S. Channappayya
◽
Bheemarjuna Reddy Tamma
Keyword(s):
Intrusion Detection
◽
Class Imbalance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Continual Learning
Download Full-text
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
IEEE Journal on Selected Areas in Communications
◽
10.1109/jsac.2006.877131
◽
2006
◽
Vol 24
(10)
◽
pp. 1781-1792
◽
Cited By ~ 99
Author(s):
S. Dharmapurikar
◽
J.W. Lockwood
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
Proceedings of ICETIT 2019 - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-030-30577-2_84
◽
2019
◽
pp. 949-960
Author(s):
Neha Gupta
◽
Punam Bedi
◽
Vinita Jindal
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Learning Algorithms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Activation Functions
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Generating realistic workloads for network intrusion detection systems
ACM SIGSOFT Software Engineering Notes
◽
10.1145/974043.974078
◽
2004
◽
Vol 29
(1)
◽
pp. 207-215
◽
Cited By ~ 25
Author(s):
Spyros Antonatos
◽
Kostas G. Anagnostakis
◽
Evangelos P. Markatos
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An evaluation technique for network intrusion detection systems
Proceedings of the 1st international conference on Scalable information systems - InfoScale '06
◽
10.1145/1146847.1146870
◽
2006
◽
Cited By ~ 5
Author(s):
Dana Zhang
◽
Christopher Leckie
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Evaluation Technique
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close