نتایج جستجو برای: based intrusion detection
تعداد نتایج: 3328279 فیلتر نتایج به سال:
In recent years, mobile ad hoc networks (MANET) have become an interesting research area. This type of networks have a salient characteristics compare with wired networks which are more vulnerable. Nowadays, for the network security, defend in depth strategies are used. One of them is intrusion detection system (IDS). Many intrusion detection techniques developed for weird networks however, bec...
Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune s...
Computer networks are more vulnerable to insider and outsider attacks in recent days due to its widespread use in each field. For that aspect, numbers of security mechanism have been applied to minimize the effect of possible attacks in the network. One of very appealing concept towards network security is intrusion detection system that can able to identify the difference between normal and ab...
intrusion detection system (IDS) is a device or software application that Li et al (2) proposed a fuzzy multi-class support vector machine algorithm, denoted. Detection System. Multiclass SVM, Neural Network, Support Vector Machine. network and (2) network based intrusion detection system which analyzes. of network intrusion detection systems for struggling progressively leading state-of-the ar...
in this paper, a robust integral of the sign error (rise) feedback controller is designed for a rigid-link electrically driven (rled) robot manipulator actuated by direct current dc motor in presence of parametric uncertainties and additive disturbances. rise feedback with implicitly learning capability is a continuous control method based on the lyapunov stability analysis to compensate an add...
wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...
in recent years, the needs of the internet are felt in lives of all people. accordingly, many studies have been done on security in virtual environment. old technics such as firewalls, authentication and encryption could not provide internet security completely; so, intrusion detection system is created as a new solution and a defense wall in cyber environment. many studies were performed on d...
internet applications spreading and its high usage popularity result insignificant increasing of cyber-attacks. consequently, network security has becomea matter of importance and several methods have been developed for these attacks.for this purpose, intrusion detection systems (ids) are being used to monitor theattacks occurred on computer networks. data mining techniques, machinelearning, ne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید