Descriptive analysis of Hash Table based Intrusion Detection Systems
暂无分享,去创建一个
[1] Vladimir Krylov,et al. DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol , 2014, ArXiv.
[2] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[3] Wei Liu,et al. Decentralized Multi-Agent System-Based Cooperative Frequency Control for Autonomous Microgrids With Communication Constraints , 2014, IEEE Transactions on Sustainable Energy.
[4] Lam-for Kwok,et al. Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection , 2014, Comput. Commun..
[5] H. Jonathan Chao,et al. FlashTrie: Beyond 100-Gb/s IP Route Lookup Using Hash-Based Prefix-Compressed Trie , 2012, IEEE/ACM Transactions on Networking.
[6] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[7] H. Jonathan Chao,et al. High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables , 2014, IEEE/ACM Transactions on Networking.
[8] Nei Kato,et al. Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.
[9] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[10] Mohammad Khubeb Siddiqui,et al. Analysis of KDD CUP 99 Dataset using Clustering based Data Mining , 2013 .
[11] Akhilesh Tiwari,et al. A Novel Data Mining based Hybrid Intrusion Detection Framework , 2014 .
[12] S. A. Joshi,et al. Network Intrusion Detection System (NIDS) based on Data Mining , 2013 .
[13] Mohammad M. Masud,et al. Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement , 2015, Comput. Secur..
[14] Timothy W. Finin,et al. A Knowledge-Based Approach to Intrusion Detection Modeling , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[15] K. Venkataramana,et al. Multi-agent Intrusion Detection and Prevention System for Cloud Environment , 2012 .
[16] Angelos D. Keromytis,et al. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS , 2011, ICISS.
[17] Shahbaz Akhtar Abid,et al. Exploiting 3D Structure for Scalable Routing in MANETs , 2013, IEEE Communications Letters.
[18] John R. Williams,et al. Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining , 2012, PAISI.
[19] Feng Zhao,et al. CSR: Classified Source Routing in Distributed Networks , 2018, IEEE Transactions on Cloud Computing.
[20] Malik Sikander Hayat Khiyal,et al. Analysis of Machine Learning Techniques for Intrusion Detection System: A Review , 2015 .
[21] Karl Henrik Johansson,et al. Distributed real-time fault detection and isolation for cooperative multi-agent systems , 2012, 2012 American Control Conference (ACC).
[22] Byung kwan Lee,et al. An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks , 2014, Future Gener. Comput. Syst..
[23] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[24] Francisco Herrera,et al. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..
[25] Josep Domingo-Ferrer,et al. Discrimination prevention in data mining for intrusion and crime detection , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[26] Alexis Olivereau,et al. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[27] Reza Azmi,et al. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..
[28] Rodolfo da Silva Villaça,et al. A Similarity Search System Based on the Hamming Distance of Social Profiles , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.
[29] Hesham Altwaijry,et al. Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..
[30] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[31] Mahdi N. Al-Ameen,et al. ReDS: A Framework for Reputation-Enhanced DHTs , 2012, IEEE Transactions on Parallel and Distributed Systems.
[32] Elena Navarro,et al. Model-driven engineering techniques for the development of multi-agent systems , 2012, Eng. Appl. Artif. Intell..
[33] M. Tech,et al. RIHT: A Novel Hybrid IP Traceback Scheme , 2014 .
[34] Dong Hoon Lee,et al. Scalable signaling protocol for Web real-time communication based on a distributed hash table , 2015, Comput. Commun..