Works matching DE "HOST-based intrusion detection systems (Computer security)"
Results: 15
MONEY LAUNDERING DETECTION FRAMEWORK TO LINK THE DISPARATE AND EVOLVING SCHEMES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 41
- By:
- Publication type:
- Article
TRENDS IN ANDROID MALWARE DETECTION.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 21
- By:
- Publication type:
- Article
An improved Hoeffding-ID data-stream classification algorithm.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 7, p. 2670, doi. 10.1007/s11227-015-1573-y
- By:
- Publication type:
- Article
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 18, doi. 10.1080/19393555.2015.1125974
- By:
- Publication type:
- Article
Malware Detection and Analysis.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1147
- By:
- Publication type:
- Article
Clinical and Genetic Profile of Children with Periodic Fever Syndromes from a Single Medical Center in South East Michigan.
- Published in:
- Journal of Clinical Immunology, 2014, v. 34, n. 1, p. 104, doi. 10.1007/s10875-013-9960-8
- By:
- Publication type:
- Article
Detection using Intrusion Detection System (IDS) and SMS Gateway Controller.
- Published in:
- International Journal of Electronics & Telecommunications, 2024, v. 70, n. 2, p. 449, doi. 10.24425/ijet.2024.149565
- By:
- Publication type:
- Article
Divided two-part adaptive intrusion detection system.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 3, p. 301, doi. 10.1007/s11276-012-0467-7
- By:
- Publication type:
- Article
Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 2, p. 601, doi. 10.2298/CSIS130415035A
- By:
- Publication type:
- Article
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1722, doi. 10.3837/tiis.2017.03.026
- By:
- Publication type:
- Article
Intrusion Detection using Continuous Time Bayesian Networks.
- Published in:
- Journal of Artificial Intelligence Research, 2010, v. 39, p. 745
- By:
- Publication type:
- Article
Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN).
- Published in:
- Journal of Computer Networks & Communications, 2019, p. 1, doi. 10.1155/2019/4683982
- By:
- Publication type:
- Article
A refined filter for UHAD to improve anomaly detection.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2434, doi. 10.1002/sec.1514
- By:
- Publication type:
- Article
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1193, doi. 10.1002/sec.1074
- By:
- Publication type:
- Article
Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/524627
- By:
- Publication type:
- Article