ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Intrusion Detection Systems
Latest Publications
TOTAL DOCUMENTS
17
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By Intech
9789533071671
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Integral Misuse and Anomaly Detection and Prevention System
Intrusion Detection Systems
◽
10.5772/15439
◽
2011
◽
Author(s):
Yoseba K.
◽
Igor Ruiz-Agndez
◽
Pablo G.
Keyword(s):
Anomaly Detection
◽
Prevention System
Download Full-text
Signal Processing Methodology for Network Anomaly Detection
Intrusion Detection Systems
◽
10.5772/15333
◽
2011
◽
Author(s):
Rafa Renk
◽
Micha Chora
◽
ukasz Saganowski
◽
Witold Houbowicz
Keyword(s):
Signal Processing
◽
Anomaly Detection
◽
Network Anomaly Detection
Download Full-text
Advanced Methods for Botnet Intrusion Detection Systems
Intrusion Detection Systems
◽
10.5772/15401
◽
2011
◽
Author(s):
Son T.
◽
Mohammed S.
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Graphics Processor-based High Performance Pattern Matching Mechanism for Network Intrusion Detection
Intrusion Detection Systems
◽
10.5772/15203
◽
2011
◽
Author(s):
Nen-Fu Huang
◽
Yen-Ming Chu
◽
Hsien-Wen Hsu
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
High Performance
◽
Network Intrusion Detection
◽
Graphics Processor
◽
Network Intrusion
◽
Matching Mechanism
◽
Performance Pattern
Download Full-text
An Agent Based Intrusion Detection System with Internal Security
Intrusion Detection Systems
◽
10.5772/14516
◽
2011
◽
Author(s):
Rafael Pez
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Internal Security
◽
Agent Based
Download Full-text
Analysis of Timing Requirements for Intrusion Detection and Prevention using Fault Tree with Time Dependencies
Intrusion Detection Systems
◽
10.5772/15609
◽
2011
◽
Author(s):
Pawel Skrobanek
◽
Marek Wo
Keyword(s):
Intrusion Detection
◽
Fault Tree
◽
Time Dependencies
◽
Intrusion Detection And Prevention
Download Full-text
Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic
Intrusion Detection Systems
◽
10.5772/14130
◽
2011
◽
Cited By ~ 3
Author(s):
Bharanidharan Shanmugam
◽
Norbik Bashah
Keyword(s):
Fuzzy Logic
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network
Intrusion Detection Systems
◽
10.5772/15250
◽
2011
◽
Author(s):
Taesub Kim
◽
Yikang Kim
◽
Byungbog Lee
◽
Seungwan Ryu
◽
Choongho Cho
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Wireless Lan
◽
Detection System
◽
Home Network
◽
Access Technique
Download Full-text
Lightweight Intrusion Detection for Wireless Sensor Networks
Intrusion Detection Systems
◽
10.5772/14849
◽
2011
◽
Cited By ~ 3
Author(s):
Eui-Nam Huh
◽
Tran Hong
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Intrusion Detection
◽
Wireless Sensor
Download Full-text
An Intrusion Detection Technique Based on Discrete Binary Communication Channels
Intrusion Detection Systems
◽
10.5772/14456
◽
2011
◽
Author(s):
Ampah
◽
N. K.
◽
Akujuobi
◽
C. M.
◽
Annamalai A.
Keyword(s):
Intrusion Detection
◽
Communication Channels
◽
Detection Technique
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close