Loading…
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.
Published in Third IEEE International Conference on Pervasive Computing and Communications Workshops : proceedings, PerCom 2005 Workshops, 8-12 March, 2005, Kauai Island, Hawaii (2005)
Published in Third IEEE International Conference on Pervasive Computing and Communications Workshops : proceedings, PerCom 2005 Workshops, 8-12 March, 2005, Kauai Island, Hawaii (2005)
Get full text
Conference Proceeding
Loading…
Detecting Network Attack using Federated Learning for IoT Devices
Thakur, Akshit, Tyagi, Ronit, Tripathy, Hrudaya Kumar, Yang, Tiansheng, Rathore, Rajkumar Singh, Mo, Danyu, Wang, Lu
Published in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) (23.08.2024)
Published in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) (23.08.2024)
Get full text
Conference Proceeding
Loading…
WATER INTRUSION DETECTION SYSTEM AND METHOD
ITO, Wataru, FUJII, Miyuki, IWANAGA, Kazunari, OKADA, Masaya, TOGASHI, Junichi
Year of Publication 14.06.2018
Get full text
Year of Publication 14.06.2018
Patent
Loading…
Subject to funds availability: intrusion detection system technology refresh [Tender documents : T28892354]
Published in MENA Report
(25.08.2015)
Get full text
Newsletter
Loading…
Implementing Machine Learning Algorithms to Indentify Distributed Denial-of-Service Attacks
Mehra, Ankush, Singh, Gurpreet, Badotra, Sumit, Kaur, Balwinder, Verma, Amit
Published in ICIIP ... proceedings (Online) (22.11.2023)
Published in ICIIP ... proceedings (Online) (22.11.2023)
Get full text
Conference Proceeding
Loading…
Intrusion Detection System For Wireless Networks
RARAVI CHANNABASAVARAJ, RAMANATHAN KARTIKEYA SRINIWAS, FOO KUNE DENIS, KUMAR GAURAV, SINGH ABHISHEK KUMAR, YERMAL SUDARSHAN
Year of Publication 27.11.2008
Get full text
Year of Publication 27.11.2008
Patent
Loading…
Alert Fusion for a Computer Host Based Intrusion Detection System
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Rozenblit, J.W.
Published in Engineering of computer-based systems : ECBS 2007 proceedings : raising expectations of computer-based systems : 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems : March 26-29, 2007, Tucson, Arizona (01.03.2007)
Published in Engineering of computer-based systems : ECBS 2007 proceedings : raising expectations of computer-based systems : 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems : March 26-29, 2007, Tucson, Arizona (01.03.2007)
Get full text
Conference Proceeding
Loading…
Loading…
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system
Sabri, Fatin Norsyafawati Mohd, Norwawi, N. M., Seman, K.
Published in 2011 7th International Conference on Information Assurance and Security (01.12.2011)
Published in 2011 7th International Conference on Information Assurance and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Loading…
An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living
Mong-Fong Horng, Bo-Chao Chang, Bei-Hao Su
Published in 2008 Eighth International Conference on Intelligent Systems Design and Applications (01.11.2008)
Published in 2008 Eighth International Conference on Intelligent Systems Design and Applications (01.11.2008)
Get full text
Conference Proceeding
Loading…
Video Surveillance System, - Intrusion Detection System, - Access Control System, [Tender documents : T35144342]
Published in MENA Report
(31.08.2016)
Get full text
Newsletter
Loading…
An evolutionary game analysis of the interaction with firewall and intrusion detection system
Ying Yin, Zi-Chao Xia
Published in 2009 International Conference on Machine Learning and Cybernetics (01.07.2009)
Published in 2009 International Conference on Machine Learning and Cybernetics (01.07.2009)
Get full text
Conference Proceeding
Loading…
Network-Level Behavioral Malware Analysis Model based on Bayesian Network
Yusof, Mohammad Hafiz Mohd, Zin, Abdullah Mohd
Published in 2021 International Conference on Computer & Information Sciences (ICCOINS) (13.07.2021)
Published in 2021 International Conference on Computer & Information Sciences (ICCOINS) (13.07.2021)
Get full text
Conference Proceeding
Loading…
Intrusion detection system
TUJI, MAHITO, TAMANO, AKIMASA, YAMADA, YASUHIRO, MIZOGUCHI, YASUNARI, IKEDA, MASAMI
Year of Publication 14.12.1994
Get full text
Year of Publication 14.12.1994
Patent
Loading…
A real-time network intrusion detection system based on incremental mining approach
Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin
Published in 2008 IEEE International Conference on Intelligence and Security Informatics (01.06.2008)
Published in 2008 IEEE International Conference on Intelligence and Security Informatics (01.06.2008)
Get full text
Conference Proceeding
Loading…