ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ENHANCED INTRUSION DETECTION TECHNIQUE WITH IP TRACEBACK
GEDRAG & ORGANISATIE REVIEW
◽
10.37896/gor33.04/028
◽
2020
◽
Vol 33
(04)
◽
Author(s):
N Sabiyath Fatima
◽
◽
N Noor Alleema
◽
S Abhishek Avilala Kumar
◽
◽
...
Keyword(s):
Intrusion Detection
◽
Detection Technique
◽
Ip Traceback
Download Full-text
Related Documents
Cited By
References
Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms
2021 IEEE International Systems Conference (SysCon)
◽
10.1109/syscon48628.2021.9447092
◽
2021
◽
Author(s):
Admilson de Ribamar Lima Ribeiro
◽
Reneilson Yves Carvalho Santos
◽
Anderson Clayton Alves Nascimento
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Anomaly Detection
◽
Data Stream
◽
Learning Algorithms
◽
Machine Learning Algorithms
◽
Detection Technique
◽
Continuous Data
Download Full-text
An intrusion detection technique based on continuous binary communication channels
International Journal of Security and Networks
◽
10.1504/ijsn.2011.043674
◽
2011
◽
Vol 6
(2/3)
◽
pp. 174
◽
Cited By ~ 11
Author(s):
Nana K. Ampah
◽
Cajetan M. Akujuobi
◽
Mathew N.O. Sadiku
◽
Shumon Alam
Keyword(s):
Intrusion Detection
◽
Communication Channels
◽
Detection Technique
Download Full-text
Examination of Intrusion Detection Technique using Characteristics of Command Chains based on the Fuzzy Measure
Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
◽
10.3156/jsoft.17.705
◽
2005
◽
Vol 17
(6)
◽
pp. 705-718
◽
Cited By ~ 1
Author(s):
Haruhiko SHIRAI
◽
Tomohiro ODAKA
◽
Hisakazu OGURA
Keyword(s):
Intrusion Detection
◽
Fuzzy Measure
◽
Detection Technique
Download Full-text
A gray-box DPDA-based intrusion detection technique using system-call monitoring
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11
◽
10.1145/2030376.2030377
◽
2011
◽
Cited By ~ 2
Author(s):
Jafar Haadi Jafarian
◽
Ali Abbasi
◽
Siavash Safaei Sheikhabadi
Keyword(s):
Intrusion Detection
◽
Detection Technique
◽
System Call
◽
Call Monitoring
Download Full-text
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Model
Data, Engineering and Applications
◽
10.1007/978-981-13-6351-1_9
◽
2019
◽
pp. 93-101
Author(s):
Neha Gupta
◽
Ritu Prasad
◽
Praneet Saurabh
◽
Bhupendra Verma
Keyword(s):
Intrusion Detection
◽
Set Theory
◽
Rough Set
◽
Rough Set Theory
◽
Theory Model
◽
Detection Technique
Download Full-text
A Hybrid Snort-Negative Selection Network Intrusion Detection Technique
International Journal of Computer Applications
◽
10.5120/ijca2016910703
◽
2016
◽
Vol 146
(5)
◽
pp. 24-31
Author(s):
Tarek M.
◽
Abdelmgeid A.
◽
Hussein M.
Keyword(s):
Intrusion Detection
◽
Negative Selection
◽
Detection Technique
◽
Network Intrusion Detection
◽
Network Intrusion
Download Full-text
Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System
Advances in Intelligent Systems and Computing - Recent Developments in Intelligent Computing, Communication and Devices
◽
10.1007/978-981-10-3779-5_10
◽
2017
◽
pp. 73-87
◽
Cited By ~ 1
Author(s):
Jamal Hussain
◽
Samuel Lalmuanawma
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Intrusion Detection System
◽
Detection System
◽
Detection Technique
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Misuse Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Systematic Intrusion Detection Technique for an In-vehicle Network Based on Time-Series Feature Extraction
2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)
◽
10.1109/ismvl.2018.00018
◽
2018
◽
Cited By ~ 6
Author(s):
Hiroki Suda
◽
Masanori Natsui
◽
Takahiro Hanyu
Keyword(s):
Time Series
◽
Feature Extraction
◽
Intrusion Detection
◽
Detection Technique
◽
Vehicle Network
Download Full-text
An iterative ellipsoid-based anomaly detection technique for intrusion detection systems
2012 Proceedings of IEEE Southeastcon
◽
10.1109/secon.2012.6196956
◽
2012
◽
Cited By ~ 3
Author(s):
Shan Suthaharan
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Detection Technique
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Privacy preservation intrusion detection technique for SCADA systems
2017 Military Communications and Information Systems Conference (MilCIS)
◽
10.1109/milcis.2017.8190422
◽
2017
◽
Cited By ~ 4
Author(s):
Marwa Keshk
◽
Nour Moustafa
◽
Elena Sitnikova
◽
Gideon Creech
Keyword(s):
Intrusion Detection
◽
Privacy Preservation
◽
Detection Technique
◽
Scada Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close