Quality of Service of Signature Based Intrusion Detection System

D Pervez, Z Inayat, A Ahmad - Available at SSRN 4812276 - papers.ssrn.com
The intrusion detection systems come loaded with a set of pre-defined signatures, for
majority of organizations these are insufficient and even worse organizations have limited or …

An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks

J Mazloum, H Bigdeli - Electronic and Cyber Defense, 2023 - ecdj.ihu.ac.ir
In today's digital era, security issues and cyber attacks have become a serious and attention-
needed concern as they hamper secured and vital information relating to organizations or …

Enhancing Network Security through Investigative Traffic Analysis: A Case Study

WJ SUNNY, A MOHAN - 2024 - diva-portal.org
In this time of increasing cyber risks, robust intrusion detection systems (IDS) are
fundamentally necessary for protecting network systems. This master thesis compares two …

[PDF][PDF] I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data

A Frasao, T Heinrich, V Fulber-Garcia, NC Will… - inf.ufpr.br
Intrusion detection in virtualized environments is vital due to the widespread adoption of
virtualization technology. A common strategy for achieving this task involves collecting data …

Evaluation of Cybersecurity Performance in Intrusion Detection Systems Based on Fuzzy VIKOR and the Nash Equilibrium

G Jin - 2022 International Conference on Intelligent Systems …, 2022 - ieeexplore.ieee.org
Intrusion detection system (IDS) is a kind of network security device that can monitor network
traffic immediately and send alarm or take active response measures when finding …

[PDF][PDF] A NEW DATASET FOR INTRUSION DETECTION IN WIRELESS LOCAL AREA NETWORK

M OZKAN-OKAY, Y AR, R SAMET - 9ROXPH, 2022 - researchgate.net
To evaluate the effectiveness of intrusion detection systems, the proposed IDS needs to be
tested on well-known datasets. In the literature, there are many commonly used datasets for …

شبکه عصبی عمیق ترکیبی بهینه ادغام شده با انتخاب ویژگی برای سامانه تشخیص نفوذ در حملات سایبری

مظلوم, بیگدلی - پدافند الکترونیکی و سایبری, 2023‎ - ecdj.ihu.ac.ir
امروزه در عصر دیجیتال، از آنجا که مسائل امنیتی و حملات سایبری، حریم اطلاعات ایمن و حیاتی
سازمان‌ها یا افراد را مختل می‌کنند، بسیار جدی و لازم توجه به شمار می‌روند. بنابراین، تشخیص به …

Utilizando argumentación rebatible en la detección y respuesta ante intrusión en sistemas biométricos

G Etchart, JC Teze, CE Alvez… - … 9 al 12 de octubre de …, 2024 - sedici.unlp.edu.ar
En las últimas décadas, la comunidad biométrica ha investigado la seguridad de los
sistemas de reconocimiento biométrico identificando puntos de ataques potenciales …

[PDF][PDF] BOOK OF FULL TEXT

A SUMMIT - 2021 - researchgate.net
Education is considered one of the most important factors that contribute to the rise and
elevation of nations; the nation's strength and progress are measured by the educational …

[引用][C] A Hybrid Intrusion Detection and