Works matching DE "INTRUSION detection systems (Computer security)"
1
- Journal of Web Engineering, 2025, v. 24, n. 3, p. 355, doi. 10.13052/jwe1540-9589.2432
- Article
2
- Fusion: Practice & Applications, 2024, v. 19, n. 2, p. 45, doi. 10.54216/FPA.190204
- Nayak, Vasanth;
- Pawar, Sumathi;
- B. L., Sunil Kumar
- Article
3
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00336-3
- Díaz-Verdejo, Jesús;
- Estepa, Rafael;
- Estepa, Antonio;
- Muñoz-Calle, Javier;
- Madinabeitia, Germán
- Article
4
- Engineering Letters, 2025, v. 33, n. 6, p. 2108
- Baiping Sun;
- Hong Dai;
- Jiwang Sun;
- Xi Wei
- Article
5
- Wireless Networks (10220038), 2025, v. 31, n. 5, p. 3873, doi. 10.1007/s11276-025-03956-w
- Binthiya, A.;
- Ravindran, Selvi
- Article
6
- Baghdad Science Journal, 2025, v. 22, n. 5, p. 1714, doi. 10.21123/bsj.2024.11067
- Zidan, Rawan Abo;
- Karraz, George
- Article
7
- Electronics (2079-9292), 2025, v. 14, n. 10, p. 1947, doi. 10.3390/electronics14101947
- Chen, Ying-Chin;
- Cheng, Chia-Hao;
- Lin, Tzu-Wei;
- Lee, Jung-San
- Article
8
- Sensors (14248220), 2025, v. 25, n. 10, p. 3155, doi. 10.3390/s25103155
- Ma, Hao;
- Fan, Yifan;
- Zhang, Yiying
- Article
9
- Sensors (14248220), 2025, v. 25, n. 10, p. 2972, doi. 10.3390/s25102972
- Shaik, Maahiya;
- Kim, Sung Won
- Article
10
- Mobile Networks & Applications, 2024, v. 29, n. 6, p. 1719, doi. 10.1007/s11036-023-02223-6
- Samha, Amani K.;
- Malik, Nidhi;
- Sharma, Deepak;
- S, Kavitha;
- Dutta, Papiya
- Article
11
- Information (2078-2489), 2025, v. 16, n. 5, p. 377, doi. 10.3390/info16050377
- Li, Min;
- Qiao, Yuansong;
- Lee, Brian
- Article
12
- Data (2306-5729), 2025, v. 10, n. 5, p. 59, doi. 10.3390/data10050059
- Elam, Marshall;
- Mink, Dustin;
- Bagui, Sikha S.;
- Plenkers, Russell;
- Bagui, Subhash C.
- Article
13
- International Journal of Industrial Engineering & Management (IJIEM), 2025, v. 16, n. 2, p. 124, doi. 10.24867/IJIEM-376
- Orken, M.;
- Abdumauvlenovna, B. D.;
- Tursynkanovna, Z. A.;
- Mekebayev, N.;
- Serikov, T.;
- Zhazira, S.;
- Aizat, K.
- Article
14
- South African Journal of Geology, 2018, v. 121, n. 4, p. 463, doi. 10.25131/sajg.121.0031
- Huber, M. S.;
- Byerly, G. R.
- Article
15
- South African Journal of Geology, 2015, v. 118, n. 3, p. 285, doi. 10.2113/gssajg.118.3.285
- Article
16
- Journal of Computer-Mediated Communication, 2022, v. 27, n. 5, p. 1, doi. 10.1093/jcmc/zmac013
- Article
17
- Government Technology, 2011, v. 24, n. 1, p. 44
- Article
18
- Ingeniería y Desarrollo, 2014, v. 32, n. 1, p. 64
- Hernández Jaimes, Antonio;
- Prada Angarita, Lina
- Article
19
- Machine Learning, 2024, v. 113, n. 8, p. 5379, doi. 10.1007/s10994-023-06470-2
- AL-Essa, Malik;
- Andresini, Giuseppina;
- Appice, Annalisa;
- Malerba, Donato
- Article
20
- Machine Learning, 2024, v. 113, n. 7, p. 4445, doi. 10.1007/s10994-023-06501-y
- Mignone, Paolo;
- Corizzo, Roberto;
- Ceci, Michelangelo
- Article
21
- Machine Learning, 2024, v. 113, n. 7, p. 4381, doi. 10.1007/s10994-023-06415-9
- Bougaham, Arnaud;
- El Adoui, Mohammed;
- Linden, Isabelle;
- Frénay, Benoît
- Article
22
- Machine Learning, 2023, v. 112, n. 11, p. 4409, doi. 10.1007/s10994-022-06300-x
- Cerqueira, Vitor;
- Torgo, Luis;
- Soares, Carlos
- Article
23
- Machine Learning, 2023, v. 112, n. 11, p. 4323, doi. 10.1007/s10994-022-06153-4
- Angiulli, Fabrizio;
- Fassetti, Fabio;
- Ferragina, Luca
- Article
24
- Machine Learning, 2022, v. 111, n. 2, p. 519, doi. 10.1007/s10994-021-06044-0
- Pei, Yulong;
- Huang, Tianjin;
- van Ipenburg, Werner;
- Pechenizkiy, Mykola
- Article
25
- Machine Learning, 2022, v. 111, n. 1, p. 1, doi. 10.1007/s10994-021-06119-y
- Koh, Pang Wei;
- Steinhardt, Jacob;
- Liang, Percy
- Article
26
- Machine Learning, 2021, v. 110, n. 10, p. 2835, doi. 10.1007/s10994-021-06047-x
- Vargaftik, Shay;
- Keslassy, Isaac;
- Orda, Ariel;
- Ben-Itzhak, Yaniv
- Article
27
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 907, doi. 10.1007/s00779-012-0529-y
- Farooqi, Ashfaq;
- Khan, Farrukh;
- Wang, Jin;
- Lee, Sungyoung
- Article
28
- Wireless Personal Communications, 2024, v. 138, n. 4, p. 2407, doi. 10.1007/s11277-024-11607-0
- Kanna, P. Rajesh;
- Santhi, P.
- Article
29
- Wireless Personal Communications, 2024, v. 138, n. 4, p. 2321, doi. 10.1007/s11277-024-11602-5
- Seniaray, Sumedha;
- Jindal, Rajni
- Article
30
- Wireless Personal Communications, 2024, v. 137, n. 4, p. 2121, doi. 10.1007/s11277-024-11477-6
- Alexander, R.;
- Pradeep Mohan Kumar, K.
- Article
31
- Wireless Personal Communications, 2024, v. 137, n. 4, p. 2409, doi. 10.1007/s11277-024-11505-5
- Rajabi, Samira;
- Asgari, Samane;
- Jamali, Shahram;
- Fotohi, Reza
- Article
32
- Wireless Personal Communications, 2024, v. 137, n. 3, p. 1559, doi. 10.1007/s11277-024-11396-6
- Ramamoorthy, Arun Kumar;
- Karuppasamy, K.
- Article
33
- Wireless Personal Communications, 2024, v. 137, n. 2, p. 671, doi. 10.1007/s11277-024-11263-4
- Ramathilagam, A.;
- Vijayalakshmi, K.
- Article
34
- Journal of Ordnance Equipment Engineering, 2023, v. 44, n. 6, p. 191, doi. 10.11809/bqzbgcxb2023.06.027
- Article
35
- Journal of Ordnance Equipment Engineering, 2023, v. 44, n. 5, p. 262, doi. 10.11809/bqzbgcxb2023.05.037
- Article
36
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 1, p. 10, doi. 10.3390/jcp5010010
- Sapkota, Binod;
- Ray, Arjun;
- Yadav, Manish Kumar;
- Dawadi, Babu R.;
- Joshi, Shashidhar R.
- Article
37
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 1, p. 3, doi. 10.3390/jcp5010003
- Roy, Dharani Kanta;
- Kalita, Hemanta Kumar
- Article
38
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 3, p. 615, doi. 10.3390/jcp4030029
- Mills, Alan;
- White, Jonathan;
- Legg, Phil
- Article
39
- 2024
- Wang, Feng;
- Tang, Yongning
- Editorial
40
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 4, p. 830, doi. 10.3390/jcp3040037
- Ghani, Humera;
- Salekzamankhani, Shahram;
- Virdee, Bal
- Article
41
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 4, p. 706, doi. 10.3390/jcp3040032
- Abdelmoumin, Ghada;
- Rawat, Danda B.;
- Rahman, Abdul
- Article
42
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 4, p. 895, doi. 10.3390/jcp3040041
- Ghosh, Tirthankar;
- Bagui, Sikha;
- Bagui, Subhash;
- Kadzis, Martin;
- Bare, Jackson
- Article
43
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 4, p. 744, doi. 10.3390/jcp3040033
- Khaemba, Noel;
- Traoré, Issa;
- Mamun, Mohammad
- Article
44
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 3, p. 544, doi. 10.3390/jcp3030026
- Ahmadi Abkenari, Fatemeh;
- Milani Fard, Amin;
- Khanchi, Sara
- Article
45
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 3, p. 451, doi. 10.3390/jcp3030023
- Ghani, Humera;
- Virdee, Bal;
- Salekzamankhani, Shahram
- Article
46
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 2, p. 118, doi. 10.3390/jcp3020008
- D'hooge, Laurens;
- Verkerken, Miel;
- Wauters, Tim;
- De Turck, Filip;
- Volckaert, Bruno
- Article
47
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 3, p. 731, doi. 10.3390/jcp2030037
- Puder, Andreas;
- Rumez, Marcel;
- Grimm, Daniel;
- Sax, Eric
- Article
48
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 3, p. 629, doi. 10.3390/jcp2030032
- Fuhr, Jessil;
- Wang, Feng;
- Tang, Yongning
- Article
49
- World Nuclear Geoscience, 2023, v. 40, n. 2, p. 339, doi. 10.3969/j.issn.1672-0636.2023.02.020
- Article
50
- Journal of Railway Science & Engineering, 2025, v. 22, n. 4, p. 1828, doi. 10.19713/j.cnki.43-1423/u.T20241118
- Article