intrusion detection systems
Node configuration for the Aho-Corasick algorithm in intrusion detection systems
3
Towards privacy preserving cooperative cloud based intrusion detection systems
88
Performance analysis of wireless intrusion detection systems
169
Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors
10
Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems
7
Efficient training data extraction framework for intrusion detection systems
5
Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM
100
Intrusion detection in network systems through hybrid supervised and unsupervised mining process - a detailed case study on the ISCX benchmark dataset -
16
Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks
73
Y-means: A Clustering Method for Intrusion Detection
6
Anomaly-based network intrusion detection using machine learning
123
An Unsupervised Clustering Algorithm for Intrusion Detection
4
Impact of IT Monoculture on Behavioral End Host Intrusion Detection
10
Sequence Covering for Efficient Host-Based Intrusion Detection
15
Intrusion Detection from Heterogenous Sensors
181
Risk monitoring with intrusion detection for industrial control systems
177
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach
9
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques
13
Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds
191
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection
17