Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(IDS). Showing records 1 – 30 of 191 total matches.

[1] [2] [3] [4] [5] [6] [7]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Tampereen ammattikorkeakoulu

1. Lemivaara, Juuso. Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä.

Degree: 2013, Tampereen ammattikorkeakoulu

Opinnäytetyö käsittelee tunkeutumisen havaitsemisjärjestelmien hyötyjä ja haittoja yrityksen käytössä. Opinnäytetyössä käydään läpi mitä velvoitteita, rajoitteita ja lakeja yrityksen verkon valvontaan liittyy ja millaisilla erilaisilla tunkeutumisen… (more)

Subjects/Keywords: snort; ids

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lemivaara, J. (2013). Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä. (Thesis). Tampereen ammattikorkeakoulu. Retrieved from http://www.theseus.fi/handle/10024/64496

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lemivaara, Juuso. “Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä.” 2013. Thesis, Tampereen ammattikorkeakoulu. Accessed July 14, 2020. http://www.theseus.fi/handle/10024/64496.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lemivaara, Juuso. “Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä.” 2013. Web. 14 Jul 2020.

Vancouver:

Lemivaara J. Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä. [Internet] [Thesis]. Tampereen ammattikorkeakoulu; 2013. [cited 2020 Jul 14]. Available from: http://www.theseus.fi/handle/10024/64496.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lemivaara J. Tunkeutumisen havaitsemisjärjestelmän hyödyt ja haitat yritysympäristössä. [Thesis]. Tampereen ammattikorkeakoulu; 2013. Available from: http://www.theseus.fi/handle/10024/64496

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

2. Parthasarathy, Saranya. Bloom Filter Based Intrusion Detection for Smart Grid.

Degree: 2012, Texas A&M University

 This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is… (more)

Subjects/Keywords: SCADA IDS; Bloom Filter Based IDS; Smart Grid IDS; IDS for SCADA System in Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parthasarathy, S. (2012). Bloom Filter Based Intrusion Detection for Smart Grid. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10768

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parthasarathy, Saranya. “Bloom Filter Based Intrusion Detection for Smart Grid.” 2012. Thesis, Texas A&M University. Accessed July 14, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10768.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parthasarathy, Saranya. “Bloom Filter Based Intrusion Detection for Smart Grid.” 2012. Web. 14 Jul 2020.

Vancouver:

Parthasarathy S. Bloom Filter Based Intrusion Detection for Smart Grid. [Internet] [Thesis]. Texas A&M University; 2012. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10768.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parthasarathy S. Bloom Filter Based Intrusion Detection for Smart Grid. [Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10768

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Brasília

3. Fábio Miziara Silveira. Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC.

Degree: 2007, Universidade de Brasília

A segurança em Manet possui muitas questões em aberto. Devido a suas características, este tipo da rede necessita a proteção preventiva e corretiva. Neste trabalho,… (more)

Subjects/Keywords: comportamento; IDS; Manet; ENGENHARIA ELETRICA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silveira, F. M. (2007). Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC. (Thesis). Universidade de Brasília. Retrieved from http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=1833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Silveira, Fábio Miziara. “Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC.” 2007. Thesis, Universidade de Brasília. Accessed July 14, 2020. http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=1833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Silveira, Fábio Miziara. “Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC.” 2007. Web. 14 Jul 2020.

Vancouver:

Silveira FM. Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC. [Internet] [Thesis]. Universidade de Brasília; 2007. [cited 2020 Jul 14]. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=1833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Silveira FM. Sistema de detecção de intrusão por anomalia no comportamento para redes AD-HOC. [Thesis]. Universidade de Brasília; 2007. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=1833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Han, Lu. Indicators of Compromise of Vehicular Systems .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsvetenskap, 2019, Chalmers University of Technology

 Modern vehicles are no longer mere mechanical devices; they are equipped with plenty of sensors and Electronic Control Units (ECUs) for their primary functions such… (more)

Subjects/Keywords: IDS; Intrusion; Detection; ECU; IOC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Han, L. (2019). Indicators of Compromise of Vehicular Systems . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Thesis, Chalmers University of Technology. Accessed July 14, 2020. http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Web. 14 Jul 2020.

Vancouver:

Han L. Indicators of Compromise of Vehicular Systems . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Han L. Indicators of Compromise of Vehicular Systems . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

5. Chapčák, David. Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection.

Degree: 2019, Brno University of Technology

 The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring and analyzing the network traffic. The work rates these instruments… (more)

Subjects/Keywords: IDS; IPS; detekce podle anomálií; behaviorální analýza; Snort; Bro-IDS; Suricata.; IDS; IPS; anomaly detection; behavioral analysis; Snort; Bro-IDS; Suricata.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chapčák, D. (2019). Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65654

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chapčák, David. “Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/65654.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chapčák, David. “Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection.” 2019. Web. 14 Jul 2020.

Vancouver:

Chapčák D. Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/65654.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chapčák D. Behaviorální analýza síťového provozu a detekce útoků (D)DoS: Behavioral Analysis of Network Traffic and (D)DoS Attack Detection. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/65654

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Federal do Maranhão

6. LIANNA MARA CASTRO DUARTE. FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS.

Degree: 2012, Universidade Federal do Maranhão

Mesmo o grande progresso das técnicas utilizadas pelos sistemas de proteção como firewalls, sistemas de detecção de invasão e antivírus para detecção e prevenção de… (more)

Subjects/Keywords: Computação Forense; MDA; IDS; CIENCIA DA COMPUTACAO; Forensics Computer; MDA; IDS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DUARTE, L. M. C. (2012). FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=803

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

DUARTE, LIANNA MARA CASTRO. “FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS.” 2012. Thesis, Universidade Federal do Maranhão. Accessed July 14, 2020. http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=803.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

DUARTE, LIANNA MARA CASTRO. “FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS.” 2012. Web. 14 Jul 2020.

Vancouver:

DUARTE LMC. FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS. [Internet] [Thesis]. Universidade Federal do Maranhão; 2012. [cited 2020 Jul 14]. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=803.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

DUARTE LMC. FORENSE COMPUTACIONAL EM AMBIENTE DE REDE BASEADO NA GERAÇÃO DE ALERTAS DE SISTEMAS DE DETECÇÃO DE INTRUSOS AUXILIADO PELA ENGENHARIA DIRIGIDA POR MODELOS. [Thesis]. Universidade Federal do Maranhão; 2012. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=803

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Rajj, Jakub. Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices.

Degree: 2019, Brno University of Technology

 The bachelor thesis is focused on the issue of denial of service attacks. These types of attacks are still up to date, but are currently… (more)

Subjects/Keywords: DDoS; DoS; IDS; MikroTik; Suricata; DDoS; DoS; IDS; MikroTik; Suricata

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajj, J. (2019). Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173501

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rajj, Jakub. “Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/173501.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rajj, Jakub. “Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices.” 2019. Web. 14 Jul 2020.

Vancouver:

Rajj J. Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/173501.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rajj J. Filtrace distribuovaných útoků na odepření služeb pomocí síťových prvků Mikrotik: Distributed denial of service filtering based on Mikrotik network devices. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173501

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

8. Kulička, Vojtěch. Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data.

Degree: 2018, Brno University of Technology

 With rising popularity of the internet there is also rising number of people misusing it. This thesis analyzes the problem of network attack detection based… (more)

Subjects/Keywords: IDS; detekce anomalií; síťová bezpečnost; IDS; anomaly detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kulička, V. (2018). Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54457

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kulička, Vojtěch. “Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data.” 2018. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/54457.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kulička, Vojtěch. “Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data.” 2018. Web. 14 Jul 2020.

Vancouver:

Kulička V. Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/54457.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kulička V. Detekce síťových útoků na základě NetFlow dat: Detection of Network Attacks Based on NetFlow Data. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/54457

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Šabík, Erik. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.

Degree: 2020, Brno University of Technology

 This bachelor's thesis discusses monitoring local networks using IP flows. It describes Nemea framework which is used for building complex systems for detecting malicious traffic.… (more)

Subjects/Keywords: Nemea; IDS; NetFlow; IPFIX; Blacklist; Nemea; IDS; NetFlow; IPFIX; Blacklist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šabík, E. (2020). Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/188134

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2020. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/188134.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2020. Web. 14 Jul 2020.

Vancouver:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/188134.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/188134

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

10. Šabík, Erik. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.

Degree: 2019, Brno University of Technology

 This bachelor's thesis discusses monitoring local networks using IP flows. It describes Nemea framework which is used for building complex systems for detecting malicious traffic.… (more)

Subjects/Keywords: Nemea; IDS; NetFlow; IPFIX; Blacklist; Nemea; IDS; NetFlow; IPFIX; Blacklist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šabík, E. (2019). Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/64152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/64152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2019. Web. 14 Jul 2020.

Vancouver:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/64152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/64152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

11. Šabík, Erik. Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis.

Degree: 2019, Brno University of Technology

 This master’s thesis describes the general information about cryptocurrencies, what principles are used in the process of creation of new coins and why mining cryptocurrencies… (more)

Subjects/Keywords: Nemea; IDS; NetFlow; IPFIX; Kryptomeny; Nemea; IDS; NetFlow; IPFIX; Cryptocurrency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šabík, E. (2019). Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šabík, Erik. “Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/69602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šabík, Erik. “Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis.” 2019. Web. 14 Jul 2020.

Vancouver:

Šabík E. Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/69602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šabík E. Detekce těžení kryptoměn pomocí analýzy dat o IP tocích: Detection of Cryptocurrency Miners Based on IP Flow Analysis. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/69602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Šabík, Erik. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.

Degree: 2020, Brno University of Technology

 This bachelor's thesis discusses monitoring local networks using IP flows. It describes Nemea framework which is used for building complex systems for detecting malicious traffic.… (more)

Subjects/Keywords: Nemea; IDS; NetFlow; IPFIX; Blacklist; Nemea; IDS; NetFlow; IPFIX; Blacklist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šabík, E. (2020). Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2020. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/190035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šabík, Erik. “Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network.” 2020. Web. 14 Jul 2020.

Vancouver:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/190035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šabík E. Detekce nežádoucího provozu v lokální síti: Detection of Malicous Traffic in Local Network. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kennesaw State University

13. Bronte, Robert N. A Framework for Hybrid Intrusion Detection Systems.

Degree: MSIT, Information Technology, 2016, Kennesaw State University

  Web application security is a definite threat to the world’s information technology infrastructure. The Open Web Application Security Project (OWASP), generally defines web application… (more)

Subjects/Keywords: IDS; Information Theory; Cross Entropy; Genetic Algorithm; Anomaly IDS; Signature IDS; Information Security; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bronte, R. N. (2016). A Framework for Hybrid Intrusion Detection Systems. (Thesis). Kennesaw State University. Retrieved from https://digitalcommons.kennesaw.edu/msit_etd/2

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bronte, Robert N. “A Framework for Hybrid Intrusion Detection Systems.” 2016. Thesis, Kennesaw State University. Accessed July 14, 2020. https://digitalcommons.kennesaw.edu/msit_etd/2.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bronte, Robert N. “A Framework for Hybrid Intrusion Detection Systems.” 2016. Web. 14 Jul 2020.

Vancouver:

Bronte RN. A Framework for Hybrid Intrusion Detection Systems. [Internet] [Thesis]. Kennesaw State University; 2016. [cited 2020 Jul 14]. Available from: https://digitalcommons.kennesaw.edu/msit_etd/2.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bronte RN. A Framework for Hybrid Intrusion Detection Systems. [Thesis]. Kennesaw State University; 2016. Available from: https://digitalcommons.kennesaw.edu/msit_etd/2

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Chi, Chao-Chuan. Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis.

Degree: Master, Institute of Health Care Management, 2008, NSYSU

 According to the report of the Bureau of National Healthcare Insurance (NHI) in 1997, the total expenses on ventilator-dependent patients was about 7,100 million yuan… (more)

Subjects/Keywords: IDS; Ventilator-Dependent Respiratory Care; DEA; Efficiency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chi, C. (2008). Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715108-164020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chi, Chao-Chuan. “Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis.” 2008. Thesis, NSYSU. Accessed July 14, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715108-164020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chi, Chao-Chuan. “Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis.” 2008. Web. 14 Jul 2020.

Vancouver:

Chi C. Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis. [Internet] [Thesis]. NSYSU; 2008. [cited 2020 Jul 14]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715108-164020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chi C. Measuring efficiency of ventilator-dependent integrated respiratory care in Taiwan : An Application of Data Envelopment Analysis. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715108-164020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

15. Ibrahim, Tarik Mohamed Abdel-Kader. Improving intrusion prevention, detection and response.

Degree: PhD, 2011, University of Plymouth

 In the face of a wide range of attacks, Intrusion Detection Systems (IDS) and other Internet security tools represent potentially valuable safeguards to identify and… (more)

Subjects/Keywords: 621.382; Security : Usability : HCI : HCI-S : IDS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibrahim, T. M. A. (2011). Improving intrusion prevention, detection and response. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/479

Chicago Manual of Style (16th Edition):

Ibrahim, Tarik Mohamed Abdel-Kader. “Improving intrusion prevention, detection and response.” 2011. Doctoral Dissertation, University of Plymouth. Accessed July 14, 2020. http://hdl.handle.net/10026.1/479.

MLA Handbook (7th Edition):

Ibrahim, Tarik Mohamed Abdel-Kader. “Improving intrusion prevention, detection and response.” 2011. Web. 14 Jul 2020.

Vancouver:

Ibrahim TMA. Improving intrusion prevention, detection and response. [Internet] [Doctoral dissertation]. University of Plymouth; 2011. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/10026.1/479.

Council of Science Editors:

Ibrahim TMA. Improving intrusion prevention, detection and response. [Doctoral Dissertation]. University of Plymouth; 2011. Available from: http://hdl.handle.net/10026.1/479


Universidad de Cantabria

16. Aranda Luengo, Ricardo. Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological.

Degree: Máster en Empresa y Tecnologías de la Información, 2013, Universidad de Cantabria

 RESUMEN: Toda persona u organización requiere de seguridad tanto física como tecnológica. A lo largo de estos últimos años han aumentado las tecnologías y los… (more)

Subjects/Keywords: IDS (Sistema de Detección de Intrusos)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aranda Luengo, R. (2013). Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological. (Masters Thesis). Universidad de Cantabria. Retrieved from http://hdl.handle.net/10902/4531

Chicago Manual of Style (16th Edition):

Aranda Luengo, Ricardo. “Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological.” 2013. Masters Thesis, Universidad de Cantabria. Accessed July 14, 2020. http://hdl.handle.net/10902/4531.

MLA Handbook (7th Edition):

Aranda Luengo, Ricardo. “Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological.” 2013. Web. 14 Jul 2020.

Vancouver:

Aranda Luengo R. Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological. [Internet] [Masters thesis]. Universidad de Cantabria; 2013. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/10902/4531.

Council of Science Editors:

Aranda Luengo R. Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica: Study of security sistems based intrudion detection physical and technological. [Masters Thesis]. Universidad de Cantabria; 2013. Available from: http://hdl.handle.net/10902/4531


Delft University of Technology

17. Vermeer, Mathew (author). CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems.

Degree: 2019, Delft University of Technology

The Internet is a relatively new technology that the world has become immensely dependent on. It is a tool that makes it possible to simplify… (more)

Subjects/Keywords: IDS; Evaluation framework; case study; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vermeer, M. (. (2019). CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4687ee42-463d-4e77-b023-dbd6dd249073

Chicago Manual of Style (16th Edition):

Vermeer, Mathew (author). “CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems.” 2019. Masters Thesis, Delft University of Technology. Accessed July 14, 2020. http://resolver.tudelft.nl/uuid:4687ee42-463d-4e77-b023-dbd6dd249073.

MLA Handbook (7th Edition):

Vermeer, Mathew (author). “CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems.” 2019. Web. 14 Jul 2020.

Vancouver:

Vermeer M(. CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://resolver.tudelft.nl/uuid:4687ee42-463d-4e77-b023-dbd6dd249073.

Council of Science Editors:

Vermeer M(. CAML-IDS: A framework for the correct assessment of machine learning-based intrusion detection systems. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:4687ee42-463d-4e77-b023-dbd6dd249073


Texas A&M University

18. Sahu, Abhijeet. Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network.

Degree: MS, Electrical Engineering, 2018, Texas A&M University

 Conventional power grids are being superseded by smart grids, which have smart meters as one of the key components. Currently, for the smart metering communication,… (more)

Subjects/Keywords: AMI; NAN; C-UNB; NS-3; IDS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sahu, A. (2018). Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/173463

Chicago Manual of Style (16th Edition):

Sahu, Abhijeet. “Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network.” 2018. Masters Thesis, Texas A&M University. Accessed July 14, 2020. http://hdl.handle.net/1969.1/173463.

MLA Handbook (7th Edition):

Sahu, Abhijeet. “Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network.” 2018. Web. 14 Jul 2020.

Vancouver:

Sahu A. Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/1969.1/173463.

Council of Science Editors:

Sahu A. Design of Real-Time Simulation Testbed for Advanced Metering Infrastructure (Ami) Network. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/173463


California State University – Sacramento

19. Bhatia, Nitin. Intelligent intrusion detection system.

Degree: MS, Computer Science, 2010, California State University – Sacramento

 Intelligent Intrusion Detection System (IIDS) is a multi-tier enterprise-level Bayesian algorithm based application written in Perl scripting language. A knowledgebased discovery process uses weights added… (more)

Subjects/Keywords: Bayes; Bayesian; IDS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhatia, N. (2010). Intelligent intrusion detection system. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/519

Chicago Manual of Style (16th Edition):

Bhatia, Nitin. “Intelligent intrusion detection system.” 2010. Masters Thesis, California State University – Sacramento. Accessed July 14, 2020. http://hdl.handle.net/10211.9/519.

MLA Handbook (7th Edition):

Bhatia, Nitin. “Intelligent intrusion detection system.” 2010. Web. 14 Jul 2020.

Vancouver:

Bhatia N. Intelligent intrusion detection system. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/10211.9/519.

Council of Science Editors:

Bhatia N. Intelligent intrusion detection system. [Masters Thesis]. California State University – Sacramento; 2010. Available from: http://hdl.handle.net/10211.9/519


Brno University of Technology

20. Golovkova, Nataliya. Komunikace MikroTik a IPS: Communications MikroTik and IPS.

Degree: 2019, Brno University of Technology

 The bachelor thesis is is focused on network attack problems and possible protection against their consequencies. The theortecical part describes the attacks that are currently… (more)

Subjects/Keywords: DoS; DDoS; IDS; IPS; Mikrotik; Suricata; RouterOS; DoS; DDoS; IDS; IPS; Mikrotik; Suricata; RouterOS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Golovkova, N. (2019). Komunikace MikroTik a IPS: Communications MikroTik and IPS. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173843

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Golovkova, Nataliya. “Komunikace MikroTik a IPS: Communications MikroTik and IPS.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/173843.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Golovkova, Nataliya. “Komunikace MikroTik a IPS: Communications MikroTik and IPS.” 2019. Web. 14 Jul 2020.

Vancouver:

Golovkova N. Komunikace MikroTik a IPS: Communications MikroTik and IPS. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/173843.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Golovkova N. Komunikace MikroTik a IPS: Communications MikroTik and IPS. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173843

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

21. Klimeš, Jan. Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks.

Degree: 2019, Brno University of Technology

 This thesis deals with filtering selected DDoS attacks on denial of the service. The the toretical part deals with the problems of general mechanisms used… (more)

Subjects/Keywords: DDoS; IDS; IPS; Iptables; Suricata; ElasticSearch; DDoS; IDS; IPS; Iptables; Suricata; ElasticSearch

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Klimeš, J. (2019). Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/177603

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Klimeš, Jan. “Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/177603.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Klimeš, Jan. “Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks.” 2019. Web. 14 Jul 2020.

Vancouver:

Klimeš J. Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/177603.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Klimeš J. Filtrace útoků na odepření služeb: Filtering of denial-of-service attacks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/177603

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Mahamat charfadine, Salim. Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things.

Degree: Docteur es, Info - Informatique, 2019, Reims

Avec l'évolution exponentielle de l'Internet des Objets (IoT), assurer la sécurité des réseaux est devenue un grand défi pour les administrateurs réseaux. La sécurité des… (more)

Subjects/Keywords: IoT; Sdn; Sécurité; OpenFlow; Firewall; Ids/ips; IoT; Sdn; Security; OpenFlow; Firewall; Ids/ips; 004.6

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahamat charfadine, S. (2019). Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things. (Doctoral Dissertation). Reims. Retrieved from http://www.theses.fr/2019REIMS011

Chicago Manual of Style (16th Edition):

Mahamat charfadine, Salim. “Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things.” 2019. Doctoral Dissertation, Reims. Accessed July 14, 2020. http://www.theses.fr/2019REIMS011.

MLA Handbook (7th Edition):

Mahamat charfadine, Salim. “Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things.” 2019. Web. 14 Jul 2020.

Vancouver:

Mahamat charfadine S. Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things. [Internet] [Doctoral dissertation]. Reims; 2019. [cited 2020 Jul 14]. Available from: http://www.theses.fr/2019REIMS011.

Council of Science Editors:

Mahamat charfadine S. Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets : Dynamic and scalable management of security rules for the Internet of Things. [Doctoral Dissertation]. Reims; 2019. Available from: http://www.theses.fr/2019REIMS011


Brno University of Technology

23. Popovec, Juraj. Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security.

Degree: 2019, Brno University of Technology

 This thesis describes mostly used technologies and methods used for securing computer networks. In detail discusses detection and intrusion prevention system (IPS) issues. Includes laboratory… (more)

Subjects/Keywords: IPS; IDS; IDPS; firewall; bezpečnosť v počítačových sieťach; IPS; IDS; IDPS; firewall; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Popovec, J. (2019). Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/1416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Popovec, Juraj. “Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/1416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Popovec, Juraj. “Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security.” 2019. Web. 14 Jul 2020.

Vancouver:

Popovec J. Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/1416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Popovec J. Zabezpečení sítě systémem s prevencí narušení: Intrusion prevention system for network security. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/1416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

24. Gerlich, Tomáš. Detekce útoků cílených na odepření služeb: Detection of denial of service attacks.

Degree: 2019, Brno University of Technology

 Master's thesis is focused on intrusion detection for denied of service attacks. These distributed DoS attacks are threat for all users on the Internet, so… (more)

Subjects/Keywords: DoS; Detekce DDoS; Suricata; IDS; IPS; DoS; Detection of DDoS; Suricata; IDS; IPS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerlich, T. (2019). Detekce útoků cílených na odepření služeb: Detection of denial of service attacks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gerlich, Tomáš. “Detekce útoků cílených na odepření služeb: Detection of denial of service attacks.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/65650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gerlich, Tomáš. “Detekce útoků cílených na odepření služeb: Detection of denial of service attacks.” 2019. Web. 14 Jul 2020.

Vancouver:

Gerlich T. Detekce útoků cílených na odepření služeb: Detection of denial of service attacks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/65650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gerlich T. Detekce útoků cílených na odepření služeb: Detection of denial of service attacks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/65650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

25. Matisko, Maroš. Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection.

Degree: 2018, Brno University of Technology

 This bachelor thesis is focused on creating a system to mitigate computer network attacks. One of the most common groups of attacks is Distributed Denial… (more)

Subjects/Keywords: DDoS; IDS; IPS; neurónové siete; Python; Pytorch; DDoS; IDS; IPS; neural networks; Python; Pytorch

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Matisko, M. (2018). Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/81982

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Matisko, Maroš. “Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection.” 2018. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/81982.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Matisko, Maroš. “Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection.” 2018. Web. 14 Jul 2020.

Vancouver:

Matisko M. Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/81982.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Matisko M. Neuronové sítě pro detekci anomálií v síťové komunikaci: Neural Networks for Network Anomaly Detection. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/81982

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Černý, Michal. Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems.

Degree: 2019, Brno University of Technology

 The detection and intrusion prevention systems could be realized as independent hardware or set in the software form on to the host. The primary purpose… (more)

Subjects/Keywords: HIDS IDS IPS NIPS Snort inline OSSEC; HIDS IDS IPS NIPS Snort inline OSSEC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Černý, M. (2019). Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/5335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Černý, Michal. “Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/5335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Černý, Michal. “Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems.” 2019. Web. 14 Jul 2020.

Vancouver:

Černý M. Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/5335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Černý M. Systémy detekce a prevence průniku: Intrusion Detection and Prevention Systems. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/5335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

27. Kuchař, Karel. Bezpečnost operačních systémů: Security of operating systems.

Degree: 2018, Brno University of Technology

 This bachelor thesis is focused on security of operating systems, which is more and more important. At first, basics of security of operating systems will… (more)

Subjects/Keywords: Bezpečnost; operační systémy; antivirus; firewall; šifrování; IDS.; Security; operating systems; antivirus; firewall; encryption; IDS.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuchař, K. (2018). Bezpečnost operačních systémů: Security of operating systems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/81989

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuchař, Karel. “Bezpečnost operačních systémů: Security of operating systems.” 2018. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/81989.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuchař, Karel. “Bezpečnost operačních systémů: Security of operating systems.” 2018. Web. 14 Jul 2020.

Vancouver:

Kuchař K. Bezpečnost operačních systémů: Security of operating systems. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/81989.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuchař K. Bezpečnost operačních systémů: Security of operating systems. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/81989

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Federal do Maranhão

28. WAGNER ELVIO DE LOIOLA COSTA. SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA.

Degree: 2012, Universidade Federal do Maranhão

The antivirus system and firewall are protection systems designed to prevent malicious work in the network, thus constituting a barrier to invaders (e.g. vírus, worms… (more)

Subjects/Keywords: IDS; SOA(Arquitetura Orientada a Serviço); Composição de serviços web; CIENCIA DA COMPUTACAO; IDS; SOA(Service Oriented Architecture); Web Services Composition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

COSTA, W. E. D. L. (2012). SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

COSTA, WAGNER ELVIO DE LOIOLA. “SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA.” 2012. Thesis, Universidade Federal do Maranhão. Accessed July 14, 2020. http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

COSTA, WAGNER ELVIO DE LOIOLA. “SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA.” 2012. Web. 14 Jul 2020.

Vancouver:

COSTA WEDL. SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA. [Internet] [Thesis]. Universidade Federal do Maranhão; 2012. [cited 2020 Jul 14]. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

COSTA WEDL. SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDSS: APLICAÇÃO AO NIDIA. [Thesis]. Universidade Federal do Maranhão; 2012. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Strakoš, Jan. Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks.

Degree: 2019, Brno University of Technology

 This bachelor thesis is focused on anomaly detection represented as computer network attacks by neural network. One of the most common groups of attacks is… (more)

Subjects/Keywords: anomálie; legitimní provoz; DDoS; IDS; neuronové sítě; Python; Scikit–learn; anomaly; legitimate traffic; DDoS; IDS; neural networks; Python; Scikit–learn

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Strakoš, J. (2019). Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Strakoš, Jan. “Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks.” 2019. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/173580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Strakoš, Jan. “Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks.” 2019. Web. 14 Jul 2020.

Vancouver:

Strakoš J. Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/173580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Strakoš J. Detekce anomálií pomocí neuronových sítí: Anomaly detection by neural networks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Černý, Marek. Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems.

Degree: 2018, Brno University of Technology

 This paper analyzes network security devices called intrusion detection (ID) systems. In order to point out possible flaws, especially ID systems using signature analysis are… (more)

Subjects/Keywords: IDS; síťová bezpečnost; analýza paketů; fragmentace; insertion; evasion; Snort; Libnet; IDS; network security; packet analysis; fragmentation; insertion; evasion; Snort; Libnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Černý, M. (2018). Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/52821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Černý, Marek. “Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems.” 2018. Thesis, Brno University of Technology. Accessed July 14, 2020. http://hdl.handle.net/11012/52821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Černý, Marek. “Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems.” 2018. Web. 14 Jul 2020.

Vancouver:

Černý M. Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Jul 14]. Available from: http://hdl.handle.net/11012/52821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Černý M. Analýza nedostatků IDS systémů: Eluding and Evasion of IDS Systems. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/52821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7]

.