Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,433,305 papers from all fields of science
Search
Sign In
Create Free Account
Intrusion detection system
Known as:
Need of intrusion detection system
, Network intrusion-detection system
, Intrusion detection and prevention system
Expand
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACARM
ACARM-ng
Aanval
Address space layout randomization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Taxonomy and Survey of Collaborative Intrusion Detection
Emmanouil Vasilomanolakis
,
Shankar Karuppayah
,
M. Mühlhäuser
,
Mathias Fischer
ACM Computing Surveys
2015
Corpus ID: 207223163
The dependency of our society on networked computers has become frightening: In the economy, all-digital networks have turned…
Expand
Highly Cited
2013
Highly Cited
2013
EAACK—A Secure Intrusion-Detection System for MANETs
E. Shakshuki
,
Nan Kang
,
T. Sheltami
IEEE transactions on industrial electronics…
2013
Corpus ID: 14810654
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and…
Expand
Highly Cited
2010
Highly Cited
2010
Intrusion Detection for Grid and Cloud Computing
Kleber Vieira
,
Alexandre Schulter
,
Carlos Becker Westphall
,
C. Westphall
IT Professional
2010
Corpus ID: 6561189
Providing security in a distributed system requires more than user authentication with passwords or digital certificates and…
Expand
Highly Cited
2008
Highly Cited
2008
Intrusion Detection System for Wireless Sensor Networks
Rahat Qureshi
,
Min Chang
,
H. Weerasinghe
,
Huirong Fu
Security and Management
2008
Corpus ID: 7075933
A process for manufacturing foamed silicone compositions by foaming a cross-linkable composition which comprises: (a) 100 parts…
Expand
Highly Cited
2008
Highly Cited
2008
Usefulness of DARPA dataset for intrusion detection system evaluation
Ciza Thomas
,
Vishwas Sharma
,
N. Balakrishnan
SPIE Defense + Commercial Sensing
2008
Corpus ID: 38603554
The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion…
Expand
Highly Cited
2006
Highly Cited
2006
Applying intrusion detection systems to wireless sensor networks
R. Román
,
Jianying Zhou
,
J. Lopez
CCNC . 3rd IEEE Consumer Communications and…
2006
Corpus ID: 6391459
The research of Intrusion Detection Systems (IDS) is a mature area in wired networks, and has also attracted many attentions in…
Expand
Highly Cited
2005
Highly Cited
2005
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Kingsly Leung
,
Christopher Leckie
Australasian Computer Science Conference
2005
Corpus ID: 14116585
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on…
Expand
Highly Cited
2005
Highly Cited
2005
Genetic algorithm to improve SVM based network intrusion detection system
Dong Seong Kim
,
Ha-Nam Nguyen
,
Jong Sou Park
19th International Conference on Advanced…
2005
Corpus ID: 17973873
In this paper, we propose genetic algorithm (GA) to improve support vector machines (SVM) based intrusion detection system (IDS…
Expand
Highly Cited
2003
Highly Cited
2003
A specification-based intrusion detection system for AODV
Chin-Yang Tseng
,
P. Balasubramanyam
,
C. Ko
,
Rattapon Limprasittiporn
,
J. Rowe
,
K. Levitt
ACM Workshop on Security of ad hoc and Sensor…
2003
Corpus ID: 941289
The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad hoc networks, offers quick adaptation to…
Expand
Highly Cited
2000
Highly Cited
2000
A revised taxonomy for intrusion-detection systems
Hervé Debar
,
M. Dacier
,
A. Wespi
Ann. des Télécommunications
2000
Corpus ID: 5509109
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE