8 results for intrusion detection.

Parameters for your search query:
Keyword    intrusion detection

Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data in Intrusion Detection Systems and Intrusion Prevention Systems
Journal of Computer Networks. 2017, 4(1), 48-55. DOI: 10.12691/jcn-4-1-5
Pub. Date: August 19, 2017Views: 37277Downloads: 34259
Open AccessReview Article
Export: RIS | BibTeX | EndNote
A Survey on Secure Network: Intrusion Detection & Prevention Approaches
American Journal of Information Systems. 2016, 4(3), 69-88. DOI: 10.12691/ajis-4-3-2
Pub. Date: December 03, 2016Views: 42923Downloads: 38002
Open AccessArticle
Export: RIS | BibTeX | EndNote
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Journal of Computer Sciences and Applications. 2021, 9(1), 16-22. DOI: 10.12691/jcsa-9-1-2
Pub. Date: October 18, 2021Views: 3796Downloads: 5024
Open AccessSpecial Issue
Export: RIS | BibTeX | EndNote
A Data Analytics System for Network Intrusion Detection Using Decision Tree
Journal of Computer Sciences and Applications. 2020, 8(1), 21-29. DOI: 10.12691/jcsa-8-1-4
Pub. Date: June 04, 2020Views: 6090Downloads: 6374
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Collaborative Intrusion Detection in Federated Cloud Environments
Journal of Computer Sciences and Applications. 2015, 3(3A), 10-20. DOI: 10.12691/jcsa-3-3A-2
Pub. Date: July 23, 2015Views: 17995Downloads: 15854Citations: 2
This article belongs to the Special Issue Big Data Analytics in Intelligent Systems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems
Journal of Computer Sciences and Applications. 2015, 3(3A), 1-9. DOI: 10.12691/jcsa-3-3A-1
Pub. Date: July 23, 2015Views: 19139Downloads: 17256Citations: 2
This article belongs to the Special Issue Big Data Analytics in Intelligent Systems
Open AccessArticle
Export: RIS | BibTeX | EndNote
Identification of Hidden VoIP (Grey Traffic)
Journal of Computer Networks. 2013, 1(2), 15-27. DOI: 10.12691/jcn-1-2-1
Pub. Date: May 19, 2013Views: 45469Downloads: 32951
Figure of 9
Open AccessArticle
Export: RIS | BibTeX | EndNote
Improving the Intrusion Detection Systems' Performance by Correlation as a Sample Selection Method
Journal of Computer Sciences and Applications. 2013, 1(3), 33-38. DOI: 10.12691/jcsa-1-3-1
Pub. Date: May 09, 2013Views: 28598Downloads: 23159Citations: 5
Figure of 3
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects

Journals



Article Types