Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Integrated Data Store

Known as: IDS, IDS - Integrated Data Store 
Integrated Data Store (IDS) was an early network database largely used by industry, known for its high performance. IDS became the basis for the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Intrusion detection in MANETS is inevitable as these networks are dynamic, open and no central authority to monitor the nodes… Expand
  • table I
  • table II
  • table III
  • figure 2
  • figure 3
Is this relevant?
2016
2016
The security related issues in the Internet have drawn a constant attention due to rapid growth of attack and its devastating… Expand
  • table I
  • table III
  • table II
  • table V
  • table IV
Is this relevant?
2015
2015
We analyze the special requirements and constraints of critical control systems.We determine the requirements imposed to IDS… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2014
2014
This paper characterizes and compares Si and SiC power MOSFETs in high temperature conditions. The superior advantages of SiC… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 3
Is this relevant?
2014
2014
In this paper we introduce REST-Net, a novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) that helps to… Expand
  • table II
  • figure 1
  • table III
  • table IV
  • figure 2
Is this relevant?
Review
2014
Review
2014
In communication the security is an essential objective. Therefore various security systems are developed for networks, among… Expand
  • figure 1
Is this relevant?
2008
2008
  • Emmanuel Hooper
  • International Conference on Intelligent Sensors…
  • 2008
  • Corpus ID: 16182921
Intrusion detection systems (IDSs) and security tools are used to monitor potential attacks in network infrastructures. These… Expand
  • figure 1
  • table I
Is this relevant?
2006
2006
String comparison algorithms, inspired by methods used in bioinformatics, have recently gained popularity in network applications… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?