Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,869,404 papers from all fields of science
Search
Sign In
Create Free Account
Intrusion detection system
Known as:
Need of intrusion detection system
, Network intrusion-detection system
, Intrusion detection and prevention system
Expand
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACARM
ACARM-ng
Aanval
Address space layout randomization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Akkimunnisha S Bindushree
,
R. Chaitra
,
Manjula Anil
2016
Corpus ID: 212466252
: Cloud computing provides the flexible architecture to share the applications as well as the other network resources. Cloud…
Expand
2010
2010
Intrusion Detection and Prevention Systems
K. Scarfone
,
P. Mell
Handbook of Information and Communication…
2010
Corpus ID: 43733166
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for…
Expand
Highly Cited
2010
Highly Cited
2010
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Guanqun Yang
,
D. Qiao
Proceedings IEEE INFOCOM
2010
Corpus ID: 6528580
Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such…
Expand
Review
2008
Review
2008
Intrusion detection in RFID systems
Geethapriya Thamilarasu
,
R. Sridhar
IEEE Military Communications Conference
2008
Corpus ID: 18927629
In recent years, advances in radio frequency identification (RFID) technology has led to their widespread adoption in diverse…
Expand
Highly Cited
2005
Highly Cited
2005
An effective intrusion detection approach for OLSR MANET protocol
M. Wang
,
L. Lamont
,
P. Mason
,
Maria Gorlatova
1st IEEE ICNP Workshop on Secure Network…
2005
Corpus ID: 13437367
The optimized link state routing (OLSR) protocol is a proactive mobile ad hoc network (MANET) routing protocol. Security aspects…
Expand
2005
2005
Wireless Intrusion Detection Systems
Giac Security Essentials
2005
Corpus ID: 63393496
This paper will briefly introduce the concept of Wireless technologies, outline the key security threats for wireless networking…
Expand
Highly Cited
2005
Highly Cited
2005
Behavioral Distance for Intrusion Detection
Debin Gao
,
M. Reiter
,
D. Song
International Symposium on Recent Advances in…
2005
Corpus ID: 11753765
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs…
Expand
Highly Cited
2004
Highly Cited
2004
Automatic generation and analysis of NIDS attacks
Shai Rubin
,
S. Jha
,
B. Miller
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 15249786
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
Highly Cited
1998
Highly Cited
1998
Neural networks applied in intrusion detection systems
J. M. Bonifacio
,
A. Cansian
,
A.C.P.L.F. De Carvalho
,
Edson dos Santos Moreira
IEEE International Joint Conference on Neural…
1998
Corpus ID: 57203440
Information is one of the most valuable possessions today. As the Internet expands both in number of hosts connected and number…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required