Зарегистрироваться
Восстановить пароль
FAQ по входу

Skrobanek P. (ed.) Intrusion Detection Systems

  • Файл формата pdf
  • размером 6,65 МБ
  • Добавлен пользователем
  • Описание отредактировано
Skrobanek P. (ed.) Intrusion Detection Systems
InTech, 2011. — 334 p.
In contrast to the typical books, this publication was created as a collection of papers of various authors from many centers around the world. The idea to show the latest achievements this way allowed for an interesting and comprehensive presentation of the area of intrusion detection systems. There is no need for convincing how important such systems are. Lately we have all witnessed exciting events related to the publication of information by WikiLeaks that resulted in increasing of various types of activities, both supporters and opponents of the portal.
Typically, the structure of a publication is planned at the beginning of a creation process, but in this situation, it reached its final shape with the completion of the content. This solution, however interesting, causes difficulties in categorization of papers. The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.
The Role of IDS for Global Network - An Overview of Methods, Cyber Security, Trends
Internet Epidemics: Attacks, Detection and Defenses, and Trends
Anomaly Based Intrusion Detection and Artificial Intelligence
Solutions and New Possibilities of IDS Constructed Based on Agent Systems
A Sustainable Component of Intrusion Detection System using Survival Architecture on Mobile Agent
Advanced Methods for Botnet Intrusion Detection Systems
Social Network Approach to Anomaly Detection in Network Systems
An Agent Based Intrusion Detection System with Internal Security
Data Processing Techniques and Other Algorithms using Intrusion Detection Systems – Simultaneously Analysis Different Detection Approach
Intrusion Detection System and Artificial Intelligent
Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic
Integral Misuse and Anomaly Detection and Prevention System
Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM
IDS Dedicated Mobile Networks – Design, Detection, Protection and Solutions
A Survey on new Threats and Countermeasures on Emerging Networks
Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network
Lightweight Intrusion Detection for Wireless Sensor Networks
Other Aspects of IDS
An Intrusion Detection Technique Based on Discrete Binary Communication Channels
Signal Processing Methodology for Network Anomaly Detection
Graphics Processor-based High Performance Pattern Matching Mechanism for Network Intrusion Detection
Analysis of Timing Requirements for Intrusion Detection and Prevention using Fault Tree with Time Dependencies
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация