Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems"
written by Indraneel Mukhopadhyay, Mohuya Chakraborty, Satyajit Chakrabarti,
published by Journal of Information Security, Vol.2 No.1, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Network intrusion detection system: A survey on artificial intelligence‐based techniques
Expert Systems, 2022
[2] Blockchain Capabilities in Defending Advanced Persistent Threats Using Correlation Technique and Hidden Markov Models (HMM)
… Security Technologies for …, 2021
[3] Banking Transaction Considerations on Standardized Browser Architecture
Proceedings of International Conference on …, 2021
[4] Aplicação do método conjunto Stacking do classificador Floresta de Caminhos Ótimos para o problema de detecção de intrusão.
2021
[5] Cloud Virtualized Middlebox: An IDS
2021
[6] Optimum-path forest stacking-based ensemble for intrusion detection
2021
[7] Guidelines for the protection of computer crime threats in the industrial business
Academy of Strategic …, 2020
[8] Internet of Things Intrusion Detection: A Deep Learning Approach
2020
[9] Penerapan Intrusion Prevention System (Ips) Sebagai Pengamanan Dari Serangan Distributed Denial Of Service (Ddos)
2020
[10] A Self organized threat intelligence architecture for intrusion detection systems
2020
[11] Deep learning: enhancing the security of software-defined networks
2019
[12] Kurumlar için siber güvenlik laboratuvarı altyapısının oluşturulması
2019
[13] Análisis de la eficiencia de los IDS open source Suricata y Snort en las PYMES
2019
[14] Detection techniques for Intrusion Detection System (IDS)
2019
[15] MergedTrie: Efficient textual indexing
2019
[16] Avaliação de sistemas de detecção de intrusão em uma rede acadêmica
2018
[17] A Survey on Intrusion Detection System (IDS)
2018
[18] Survey on intrusion detection system (IDS)
Int. J. Technol. Res. Manag., 2018
[19] Detection and Prevention Cyber-Attacks for Smart Buildings via Private Cloud Environment
2018
[20] A survey on types of machine learning techniques in intrusion prevention systems
2017
[21] Comparative Study on Firewall and Intrusion Detection System
2017
[22] A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions
Biometric Security and Privacy, 2017
[23] A machine-learning-based system for real-time advanced persistent threat detection and prediction
2017
[24] Performance analysis of open source IDPS in virtual computing environment
2016
[25] Asiakasjärjestelmien turvaaminen hyökkäyksenestojärjestelmällä
2016
[26] DETECTING NETWORK INTRUSION BASED ON DATA MINING TECHNIQUES AND ITS APPLICATION FOR MEDICAL SENSOR NETWORK
2016
[27] Anomaly detector for computer networks
2015/04/14/
[28] Network access and admission restriction using traffic monitoring and vulnerability detection
2015
[29] Information Security Systems Policy Violation: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence
ProQuest Dissertations Publishing, 2015
[30] Heuristic Intrusion Detection and Prevention System
2015
[31] IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions
2015
[32] REVIEW: PHISHING ATTACK DETECTION AND PREVENTION
2015
[33] A Survey on Intrusion Detection and Prevention Systems
2014
[34] Concurrency in Intrusion Detection Systems: A Study in F
ProQuest Dissertations Publishing, 2014
[35] Detecção cega de tráfego malicioso através da variação temporal do maior autovalor
2014
[36] Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
Journal of Information Security, 2014
[37] Intrusion Detection System Using Bayesian Network Modeling
Proceedings of the 13th European Conference on Cyber warefare and Security: ECCWS 2014. Academic Conferences Limited, 2014
[38] An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
database, 2014
[39] Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
M Culhane, 2014
[40] Implementation of Intrusion Detection and Prevention System Using JPCAP/WINPCAP
2014
[41] A Trust Model Tolerating the Behavior of Malicious Users
2014
[42] یک مدل اعتماد دارای تحمل‌پذیری در برابر رفتار کاربران بدخواه‎
2014
[43] Efficacy of Attack detection capability of IDPS based on it's deployment in wired and wireless environment
arXiv preprint arXiv:1304.5022, 2013
[44] Survey on Machine Learning Techniques for Intrusion Detection Systems
International Journal of Advanced Research in Computer and Communication Engineering, 2013
[45] A Plug in Implementation for Phishing Attacks Using C4. 5 Algorithm
International Journal of Recent Development in Engineering and Technology, 2013
[46] A survey on machine learning techniques for intrusion detection systems
International Journal of Advanced Research in Computer and Communication Engineering, 2013
[47] IPSFlow: Um framework para Sistema de Prevenção de Intrusão baseado em Redes Definidas por Software
2013
[48] Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
International Journal of Information Technology & Computer Science, 2013
[49] A Study to investigate the possibility of using a decision-making model with IPS
F Najjar - ampublisher.com, 2012
[50] A Study on Security Capability of IDPS
The Institute of Electronics Engineers of Korea - Computer and Information, 2012
[51] II Workshop de Pesquisa Experimental da Internet do Futuro (WPEIF)
2012
[52] PENCEGAHAN BRUTE FORCE AUTHENTICATION VIA PROTOKOL SSH (SECURE SHELL) MENGGUNAKAN METODE HOST BASED INTRUSION DETECTION SYSTEM (HIDS)
Konferensi Nasional Sistem Informasi, 2012
[53] Ipsflow–uma proposta de sistema de preven?ao de intrusao baseado no framework openflow
III WPEIF-SBRC, 2012
[54] A study of Methodologies used in Intrusion Detection and Prevention Systems (IDPS)
Southeastcon, 2012 Proceedings of IEEE, 2012
[55] Survey on Intrusion Detection and Prevention System: A MANET Perspective
International Journal of Scientific & Engineering Research, 2012
[56] Process Flow Features as a Host-Based Event Knowledge Representation
2012
[57] A Study Of Methodologies Used In Intrusion Detection And Prevention Systems
2012
[58] IPSFlow–uma proposta de IPS distribuído para captura e bloqueio seletivo de tráfego malicioso em redes definidas por software
Anais do XII Simpósio …, 2012
[59] A study on network intrusion detection and prevention system current status and challenging issues
Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on. IET, 2011
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top