ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
2009 WRI World Congress on Software Engineering
◽
10.1109/wcse.2009.225
◽
2009
◽
Cited By ~ 4
Author(s):
Desheng Fu
◽
Shu Zhou
◽
Ping Guo
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Distributed Network
◽
Design And Implementation
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Related Documents
Cited By
References
Design and Implementation of an Initiative and Passive Network Intrusion Detection System
2009 Second International Symposium on Information Science and Engineering
◽
10.1109/isise.2009.29
◽
2009
◽
Author(s):
Tian Li
◽
Xueming Zhai
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Design And Implementation
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Passive Network
Download Full-text
Agent-Based Network Intrusion Detection System Using Data Mining Approaches
Third International Conference on Information Technology and Applications (ICITA'05)
◽
10.1109/icita.2005.57
◽
2005
◽
Cited By ~ 5
Author(s):
Cheung-Leung Lui
◽
Tak-Chung Fu
◽
Ting-Yee Cheung
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Agent Based
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Using Data
Download Full-text
Design and Implementation of High-Speed Pattern Matcher Using Multi-Entry Simultaneous Comparator in Network Intrusion Detection System
The Journal of Korean Institute of Communications and Information Sciences
◽
10.7840/kics.2015.40.11.2169
◽
2015
◽
Vol 40
(11)
◽
pp. 2169-2177
Author(s):
Myung-Jae Jeon
◽
Sun-Young Hwang
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
High Speed
◽
Detection System
◽
Network Intrusion Detection
◽
Design And Implementation
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
A distributed network intrusion detection system architecture based on computer stations using GPGPU
2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES)
◽
10.1109/ines.2013.6632834
◽
2013
◽
Cited By ~ 6
Author(s):
L. Vokorokos
◽
M. Ennert
◽
M. Cajkovsky
◽
A. Turinska
Keyword(s):
Intrusion Detection
◽
System Architecture
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Distributed Network
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Design and Implementation of a Distributed Intelligent Network Intrusion Detection System
2010 International Conference on Electrical and Control Engineering
◽
10.1109/icece.2010.174
◽
2010
◽
Cited By ~ 1
Author(s):
Li Tian
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Intelligent Network
◽
Design And Implementation
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
An efficient and scalable coordinating algorithm for distributed network intrusion detection system
2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE)
◽
10.1109/jcsse.2015.7219799
◽
2015
◽
Author(s):
Tewapong Wongkhuenkaew
◽
Pruet Boonma
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Distributed Network
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Agent-oriented network intrusion detection system using data mining approaches
International Journal of Agent-Oriented Software Engineering
◽
10.1504/ijaose.2007.014403
◽
2007
◽
Vol 1
(2)
◽
pp. 158
◽
Cited By ~ 1
Author(s):
Tak Chung Fu
◽
Chung Leung Lui
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Using Data
Download Full-text
Intelligent network intrusion detection system using data mining techniques
2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)
◽
10.1109/icatcct.2016.7912017
◽
2016
◽
Cited By ~ 14
Author(s):
Amreen Sultana
◽
M.A. Jabbar
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Intelligent Network
◽
Data Mining Techniques
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Using Data
Download Full-text
Network Intrusion Detection System Using Data Mining
Engineering Applications of Neural Networks - Communications in Computer and Information Science
◽
10.1007/978-3-642-32909-8_11
◽
2012
◽
pp. 104-113
◽
Cited By ~ 5
Author(s):
Lídio Mauro Lima de Campos
◽
Roberto Célio Limão de Oliveira
◽
Mauro Roisenberg
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Using Data
Download Full-text
Proposed vision for Network Intrusion Detection System using Latent Semantic Analysis and data mining
2014 6th Computer Science and Electronic Engineering Conference (CEEC)
◽
10.1109/ceec.2014.6958547
◽
2014
◽
Cited By ~ 1
Author(s):
Ikhlas K. Gbashi
◽
Soukaena H. Hashem
◽
Saad K. Majeed
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Latent Semantic Analysis
◽
Intrusion Detection System
◽
Semantic Analysis
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close