Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,303 papers from all fields of science
Search
Sign In
Create Free Account
Intrusion detection system
Known as:
Need of intrusion detection system
, Network intrusion-detection system
, Intrusion detection and prevention system
Expand
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACARM
ACARM-ng
Aanval
Address space layout randomization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Intrusion Detection and Prevention Systems
K. Scarfone
,
P. Mell
Handbook of Information and Communication…
2010
Corpus ID: 43733166
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for…
Expand
Highly Cited
2010
Highly Cited
2010
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Guanqun Yang
,
D. Qiao
Proceedings IEEE INFOCOM
2010
Corpus ID: 6528580
Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such…
Expand
Review
2008
Review
2008
Intrusion detection in RFID systems
Geethapriya Thamilarasu
,
R. Sridhar
IEEE Military Communications Conference
2008
Corpus ID: 18927629
In recent years, advances in radio frequency identification (RFID) technology has led to their widespread adoption in diverse…
Expand
2005
2005
Wireless Intrusion Detection Systems
Giac Security Essentials
2005
Corpus ID: 63393496
This paper will briefly introduce the concept of Wireless technologies, outline the key security threats for wireless networking…
Expand
Highly Cited
2005
Highly Cited
2005
Fast reconfiguring deep packet filter for 1+ gigabit network
Young H. Cho
,
W. Mangione-Smith
IEEE Symposium on Field-Programmable Custom…
2005
Corpus ID: 7915650
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network…
Expand
Highly Cited
2005
Highly Cited
2005
Behavioral Distance for Intrusion Detection
Debin Gao
,
M. Reiter
,
D. Song
International Symposium on Recent Advances in…
2005
Corpus ID: 11753765
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs…
Expand
Highly Cited
2004
Highly Cited
2004
Automatic generation and analysis of NIDS attacks
Shai Rubin
,
S. Jha
,
B. Miller
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 15249786
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance…
Expand
Highly Cited
2004
Highly Cited
2004
A mobile agent security management
Eung-Gu You
,
Keum-Suk Lee
18th International Conference on Advanced…
2004
Corpus ID: 16590820
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In…
Expand
Highly Cited
2002
Highly Cited
2002
An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events
Carol A. Taylor
,
J. Alves-Foss
New Security Paradigms Workshop
2002
Corpus ID: 7102225
This paper presents results of an empirical analysis of NATE (Network Analysis of Anomalous Traffic Events), a lightweight…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE