Intrusions present a very serious security threat in a network environment. It is therefore essential to detect intrusions to prevent compromising the stability of the system or the security of information that is stored on the network. The most difficult problem is detecting new intrusion types, of which intrusion detection systems may not be aware. Many of the signature based methods and learning algorithms generally cannot detect these new intrusions. We propose an optimized algorithm called n-CP clustering algorithm that is capable of detecting intrusions that may be new or otherwise. The algorithm also overcomes two significant shortcomings of K-Means clustering namely dependency and degeneracy on the number of clusters. The proposed c...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT ne...
Since the early days of information technology, there have been many stakeholders who used the techn...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Web application security is a definite threat to the world’s information technology infrastructure. ...
With the recent advances in Internet-of-thing devices (IoT), cloud-based services, and diversity in ...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, GrimstadAttacks o...
Every secure system has the possibility to fail. Therefore, extra effort should be taken to protect ...
Designers of intrusion detection systems are often faced with the problem that their design fails to...
A thesis presented to the faculty of the College of Science and Technology at Morehead State Univers...
Intrusion detection systems are systems that aim at identifying malicious activities or violation of...
The issue that this study addresses is the high rate of false positives, high maintenance, and lack ...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT ne...
Since the early days of information technology, there have been many stakeholders who used the techn...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Web application security is a definite threat to the world’s information technology infrastructure. ...
With the recent advances in Internet-of-thing devices (IoT), cloud-based services, and diversity in ...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, GrimstadAttacks o...
Every secure system has the possibility to fail. Therefore, extra effort should be taken to protect ...
Designers of intrusion detection systems are often faced with the problem that their design fails to...
A thesis presented to the faculty of the College of Science and Technology at Morehead State Univers...
Intrusion detection systems are systems that aim at identifying malicious activities or violation of...
The issue that this study addresses is the high rate of false positives, high maintenance, and lack ...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT ne...