Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sistema de detección de intrusiones")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 272

  • Page / 11
Export

Selection :

  • and

Intrusion detection system: A comprehensive reviewLIAO, Hung-Jen; LIN, Chun-Hung Richard; LIN, Ying-Chih et al.Journal of network and computer applications. 2013, Vol 36, Num 1, pp 16-24, issn 1084-8045, 9 p.Article

A Methodology to Identify Complex Network AttacksFRYE, Lisa; CHENG, Liang; KAPLAN, Randy et al.Security & management. International conferenceWorldComp'2011. 2011, pp 346-352, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Internal Vs. External Penetrations: A Computer Security DilemmaDIAZ-GOMEZ, Pedro A; VALLECARCAMO, Gilberto; JONES, Douglas et al.Security & management. International conferenceWorldComp'2011. 2011, pp 59-64, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 6 p.Conference Paper

False alarm minimization techniques in signature-based intrusion detection systems: A surveyHUBBALLI, Neminath; SURYANARAYANAN, Vinoth.Computer communications. 2014, Vol 49, pp 1-17, issn 0140-3664, 17 p.Article

An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security EventsLEE, Haeng-Gon; SONG, Jungsuk; CHOI, Sang-Soo et al.IEICE transactions on communications. 2013, Vol 96, Num 7, pp 1803-1813, issn 0916-8516, 11 p.Article

A Retroactive-Burst Framework for Automated Intrusion Response SystemSHAMELI-SENDI, Alireza; DESFOSSEZ, Julien; DAGENAIS, Michel et al.Journal of Computer Networks and Communications (Print). 2013, Vol 2013, pp 1-8, issn 2090-7141, 8 p.Article

Automatic Attack Signature Generation Systems: A ReviewKAUR, Sanmeet; SINGH, Maninder.IEEE security & privacy. 2013, Vol 11, Num 6, pp 54-61, issn 1540-7993, 8 p.Article

Defense on the Move: Ant-Based Cyber Defense : Moving TargetFINK, Glenn A; HAACK, Jereme N; MCKINNON, A. David et al.IEEE security & privacy. 2014, Vol 12, Num 2, pp 36-43, issn 1540-7993, 8 p.Article

A survey of intrusion detection techniques in CloudMODI, Chirag; PATEL, Dhiren; BORISANIYA, Bhavesh et al.Journal of network and computer applications. 2013, Vol 36, Num 1, pp 42-57, issn 1084-8045, 16 p.Article

Combating Good Point Set Scanning-based Self-learning Worms by Using PredatorsFANGWEI WANG; YUNKAI ZHANG; HONGGANG GUO et al.International journal of network security (Print). 2013, Vol 15, Num 3, pp 171-178, issn 1816-353X, 8 p.Article

Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectorsALSALEH, Mansour; VAN OORSCHOT, P. C.International journal of information security (Print). 2013, Vol 12, Num 2, pp 97-110, issn 1615-5262, 14 p.Article

Tamper-resistant Monitoring for Securing Multi-core EnvironmentsMEHRESH, Ruchika; RAO, Jairaj J; UPADHYAYA, Shambhu et al.Security & management. International conferenceWorldComp'2011. 2011, pp 372-378, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Thwarting Obfuscated Malware via Differential Fault Analysis : Mobile Application SecuritySUAREZ-TANGIL, Guillermo; TAPIADOR, Juan E; LOMBARDI, Flavio et al.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 24-31, issn 0018-9162, 8 p.Article

Malware Detection and Prevention System Based on Multi-Stage RulesALAZAB, Ammar; HOBBS, Michael; ABAWAJY, Jemal et al.International journal of information security and privacy. 2013, Vol 7, Num 2, pp 29-43, issn 1930-1650, 15 p.Article

Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical MemoryVIJAYARAGAVAN, Arun; MOHAN KUMAR, P; SHUNMUGANATHAN, K. L et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 98-103, issn 1939-3555, 6 p.Article

Security configuration management in Intrusion Detection and Prevention SystemsALSUBHI, K; ALHAZMI, Y; BOUABDALLAH, N et al.International journal of security and networks (Print). 2012, Vol 7, Num 1, pp 30-39, issn 1747-8405, 10 p.Article

Enhancing Intrusion Detection System with proximity informationZHENYUN ZHUANG; YING LI; ZESHENG CHEN et al.International journal of security and networks (Print). 2010, Vol 5, Num 4, pp 207-219, issn 1747-8405, 13 p.Article

A New Approach to Detecting Malicious Modification to Streaming Data Using Integer StuffingHUIJIE CUI; HUIPING GUO; CHENGYU SUN et al.Security & management. International conferenceWorldComp'2010. 2010, pp 393-399, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Modeling NIDS evasion with Genetic ProgrammingPASTRANA, S; ORFILA, A; RIBAGORDA, A et al.Security & management. International conferenceWorldComp'2010. 2010, pp 444-448, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

Proving correctness of regular expression matchers with constrained repetitionHEYSE, K; BRUNEEL, K; STROOBANDT, D et al.Electronics letters. 2013, Vol 49, Num 1, pp 41-42, issn 0013-5194, 2 p.Article

Using Cloud Computing to Implement a Security Overlay NetworkSALAH, Khaled; ALCARAZ CALERO, Jose M; ZEADALLY, Sherali et al.IEEE security & privacy. 2013, Vol 11, Num 1, pp 44-53, issn 1540-7993, 10 p.Article

Needles in a haystack: Fast spatial search for targets in similar-looking backgroundsHEIDARY, Kaveh; CAULFIELD, H. John.Journal of the Franklin Institute. 2012, Vol 349, Num 10, pp 2935-2955, issn 0016-0032, 21 p.Article

Cloudebug: A Programmable Online Malware TestbedWANG, Chi-Wei; WANG, Chia-Wei; HSIEH, Chu-An et al.Computer (Long Beach, CA). 2014, Vol 47, Num 7, pp 90-92, issn 0018-9162, 3 p.Article

Enhancing IDS performance through comprehensive alert post-processingSPATHOULAS, Georgios P; KATSIKAS, Sokratis K.Computers & security. 2013, Vol 37, pp 176-196, issn 0167-4048, 21 p.Article

Characterizing and Detecting Malicious CrowdsourcingTIANYI WANG; GANG WANG; XING LI et al.Computer communication review. 2013, Vol 43, Num 4, pp 537-538, issn 0146-4833, 2 p.Conference Paper

  • Page / 11