Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Intrusion Detection). Showing records 1 – 30 of 516 total matches.

[1] [2] [3] [4] [5] … [18]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Guelph

1. Nyakundi, Eric. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION .

Degree: 2015, University of Guelph

 Recent increase in hacks and computer network attacks around the world, including Sony Pictures (2014), Home Depot (2014), and Target (2014) gives a compelling need… (more)

Subjects/Keywords: Support Vector Machines; Intrusion detection systems; Anomaly intrusion detection; Network intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyakundi, E. (2015). USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION . (Thesis). University of Guelph. Retrieved from https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION .” 2015. Thesis, University of Guelph. Accessed January 17, 2020. https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION .” 2015. Web. 17 Jan 2020.

Vancouver:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION . [Internet] [Thesis]. University of Guelph; 2015. [cited 2020 Jan 17]. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION . [Thesis]. University of Guelph; 2015. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

2. Dass, Mayukh. LIDS: a Learning Intrusion Detection System.

Degree: MS, Artificial Intelligence, 2003, University of Georgia

 The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers,… (more)

Subjects/Keywords: Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dass, M. (2003). LIDS: a Learning Intrusion Detection System. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/dass_mayukh_200308_ms

Chicago Manual of Style (16th Edition):

Dass, Mayukh. “LIDS: a Learning Intrusion Detection System.” 2003. Masters Thesis, University of Georgia. Accessed January 17, 2020. http://purl.galileo.usg.edu/uga_etd/dass_mayukh_200308_ms.

MLA Handbook (7th Edition):

Dass, Mayukh. “LIDS: a Learning Intrusion Detection System.” 2003. Web. 17 Jan 2020.

Vancouver:

Dass M. LIDS: a Learning Intrusion Detection System. [Internet] [Masters thesis]. University of Georgia; 2003. [cited 2020 Jan 17]. Available from: http://purl.galileo.usg.edu/uga_etd/dass_mayukh_200308_ms.

Council of Science Editors:

Dass M. LIDS: a Learning Intrusion Detection System. [Masters Thesis]. University of Georgia; 2003. Available from: http://purl.galileo.usg.edu/uga_etd/dass_mayukh_200308_ms

3. Ferreira, Eduardo Alves. Detecção autônoma de intrusões utilizando aprendizado de máquina.

Degree: Mestrado, Ciências de Computação e Matemática Computacional, 2011, University of São Paulo

A evolução da tecnologia da informação popularizou o uso de sistemas computacionais para a automação de tarefas operacionais. As tarefas de implantação e manutenção desses… (more)

Subjects/Keywords: Detecção de intrusão; Intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, E. A. (2011). Detecção autônoma de intrusões utilizando aprendizado de máquina. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;

Chicago Manual of Style (16th Edition):

Ferreira, Eduardo Alves. “Detecção autônoma de intrusões utilizando aprendizado de máquina.” 2011. Masters Thesis, University of São Paulo. Accessed January 17, 2020. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;.

MLA Handbook (7th Edition):

Ferreira, Eduardo Alves. “Detecção autônoma de intrusões utilizando aprendizado de máquina.” 2011. Web. 17 Jan 2020.

Vancouver:

Ferreira EA. Detecção autônoma de intrusões utilizando aprendizado de máquina. [Internet] [Masters thesis]. University of São Paulo; 2011. [cited 2020 Jan 17]. Available from: http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;.

Council of Science Editors:

Ferreira EA. Detecção autônoma de intrusões utilizando aprendizado de máquina. [Masters Thesis]. University of São Paulo; 2011. Available from: http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;

4. Victor, Ganta Jacob. Intrusion Detection Systems False Positives;.

Degree: Compute Science Engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Computers and internet have become a part of human life, to address security challenges tools like Anti-viruses, Firewalls, Intrusion Detection Systems (IDS) etc. are deployed.… (more)

Subjects/Keywords: Detection; False; Intrusion; Positives; Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Victor, G. J. (2013). Intrusion Detection Systems False Positives;. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed January 17, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Web. 17 Jan 2020.

Vancouver:

Victor GJ. Intrusion Detection Systems False Positives;. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2020 Jan 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Victor GJ. Intrusion Detection Systems False Positives;. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

5. Jha, Manjari. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.

Degree: 2018, Penn State University

 This thesis focuses on developing probabilistic models for the analysis of diverse datasets using unsupervised clustering techniques. Primarily, we focus on two main fields: the… (more)

Subjects/Keywords: metagenomics; intrusion detection; clustering; unsupervised

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jha, M. (2018). Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Thesis, Penn State University. Accessed January 17, 2020. https://etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Web. 17 Jan 2020.

Vancouver:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Jan 17]. Available from: https://etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North-West University

6. Ohaeri, Ifeoma Ugochi. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .

Degree: 2012, North-West University

 With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as… (more)

Subjects/Keywords: Intrusion detection systems; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohaeri, I. U. (2012). Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Thesis, North-West University. Accessed January 17, 2020. http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Web. 17 Jan 2020.

Vancouver:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Internet] [Thesis]. North-West University; 2012. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Thesis]. North-West University; 2012. Available from: http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

7. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed January 17, 2020. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 17 Jan 2020.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

8. Seifert, Christian. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.

Degree: 2010, Victoria University of Wellington

 With the increasing connectivity of and reliance on computers and networks, important aspects of computer systems are under a constant threat. In particular, drive-by-download attacks… (more)

Subjects/Keywords: Intrusion detection; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifert, C. (2010). Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1385

Chicago Manual of Style (16th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Doctoral Dissertation, Victoria University of Wellington. Accessed January 17, 2020. http://hdl.handle.net/10063/1385.

MLA Handbook (7th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Web. 17 Jan 2020.

Vancouver:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2010. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10063/1385.

Council of Science Editors:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Doctoral Dissertation]. Victoria University of Wellington; 2010. Available from: http://hdl.handle.net/10063/1385


University of Waterloo

9. Ali, Karim. Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems.

Degree: 2010, University of Waterloo

Intrusion detection systems (IDSes) are an important security measure that network administrators adopt to defend computer networks against malicious attacks and intrusions. The field of… (more)

Subjects/Keywords: intrusion detection systems; security; networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, K. (2010). Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4921

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ali, Karim. “Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems.” 2010. Thesis, University of Waterloo. Accessed January 17, 2020. http://hdl.handle.net/10012/4921.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ali, Karim. “Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems.” 2010. Web. 17 Jan 2020.

Vancouver:

Ali K. Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems. [Internet] [Thesis]. University of Waterloo; 2010. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10012/4921.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ali K. Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems. [Thesis]. University of Waterloo; 2010. Available from: http://hdl.handle.net/10012/4921

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Han, Lu. Indicators of Compromise of Vehicular Systems .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsvetenskap, 2019, Chalmers University of Technology

 Modern vehicles are no longer mere mechanical devices; they are equipped with plenty of sensors and Electronic Control Units (ECUs) for their primary functions such… (more)

Subjects/Keywords: IDS; Intrusion; Detection; ECU; IOC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Han, L. (2019). Indicators of Compromise of Vehicular Systems . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Thesis, Chalmers University of Technology. Accessed January 17, 2020. http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Web. 17 Jan 2020.

Vancouver:

Han L. Indicators of Compromise of Vehicular Systems . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Han L. Indicators of Compromise of Vehicular Systems . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

11. Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. Hidden Markov Model Based Intrusion Alert Prediction.

Degree: 2016, University of Western Ontario

Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions is the next step to provide an active defense against incoming… (more)

Subjects/Keywords: Feature Reduction; HMM; Intrusion Alerts; Intrusion Detection; Intrusion Prediction; Other Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miriya Thanthrige, U. S. K. P. (2016). Hidden Markov Model Based Intrusion Alert Prediction. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Thesis, University of Western Ontario. Accessed January 17, 2020. https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Web. 17 Jan 2020.

Vancouver:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Internet] [Thesis]. University of Western Ontario; 2016. [cited 2020 Jan 17]. Available from: https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Thesis]. University of Western Ontario; 2016. Available from: https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

12. Yadav, Meeta. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.

Degree: PhD, Computer Engineering, 2009, North Carolina State University

 YADAV, MEETA. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection. (Under the direction of Professor Paul D. Franzon). Intrusion detection systems protect… (more)

Subjects/Keywords: Network Intrusion Prevention; Hardware Architecture; Security; Network Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yadav, M. (2009). Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5601

Chicago Manual of Style (16th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Doctoral Dissertation, North Carolina State University. Accessed January 17, 2020. http://www.lib.ncsu.edu/resolver/1840.16/5601.

MLA Handbook (7th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Web. 17 Jan 2020.

Vancouver:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2020 Jan 17]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601.

Council of Science Editors:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601


University of New Mexico

13. Fugate, Sunny. Methods for speculatively bootstrapping better intrusion detection system performance.

Degree: Department of Computer Science, 2012, University of New Mexico

 During the last three decades, the designers of computer IDSs have been continuously challenged with performance bottlenecks and scalability issues. The number of threats is… (more)

Subjects/Keywords: intrusion detection; performance optimization; speculative optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fugate, S. (2012). Methods for speculatively bootstrapping better intrusion detection system performance. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/22040

Chicago Manual of Style (16th Edition):

Fugate, Sunny. “Methods for speculatively bootstrapping better intrusion detection system performance.” 2012. Doctoral Dissertation, University of New Mexico. Accessed January 17, 2020. http://hdl.handle.net/1928/22040.

MLA Handbook (7th Edition):

Fugate, Sunny. “Methods for speculatively bootstrapping better intrusion detection system performance.” 2012. Web. 17 Jan 2020.

Vancouver:

Fugate S. Methods for speculatively bootstrapping better intrusion detection system performance. [Internet] [Doctoral dissertation]. University of New Mexico; 2012. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1928/22040.

Council of Science Editors:

Fugate S. Methods for speculatively bootstrapping better intrusion detection system performance. [Doctoral Dissertation]. University of New Mexico; 2012. Available from: http://hdl.handle.net/1928/22040

14. Badger, Eric C. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 This work explores a scalable data analytics pipeline for real-time attack detection through the use of customized honeypots at the National Center for Supercomputing Applications… (more)

Subjects/Keywords: Intrusion Detection

Detection System ICSI International Computer Science Institute IDS Intrusion Detection System… …Network-based Intrusion Detection System (NIDS). Unlike OSSEC, Bro is running directly… …Comma-separated Values DDoS Distributed Denial of Service HIDS Host-based Intrusion… …Registry NCSA National Center for Supercomputing Applications NIDS Network-based Intrusion… …Detection System NSF National Science Foundation OS Operating System OSSEC Open Source… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badger, E. C. (2015). Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed January 17, 2020. http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Web. 17 Jan 2020.

Vancouver:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

15. Sridhar, Srikumar. Testbed Design For Evaluation Of Active Cyber Defense Systems.

Degree: 2018, Penn State University

 As with any system, often times, an attacker only needs to know a single vulnerability to compromise the entire system. To ensure a system is… (more)

Subjects/Keywords: Moving Target Defense; Container Migration; Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sridhar, S. (2018). Testbed Design For Evaluation Of Active Cyber Defense Systems. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Thesis, Penn State University. Accessed January 17, 2020. https://etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Web. 17 Jan 2020.

Vancouver:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Jan 17]. Available from: https://etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

16. Tran, TP. Innovative machine learning techniques for security detection problems.

Degree: 2009, University of Technology, Sydney

 Most of the currently available network security techniques cannot cope with the dynamic and increasingly complex nature of the attacks on distributed computer systems. Therefore,… (more)

Subjects/Keywords: Intrusion detection system.; Machine learning.; Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tran, T. (2009). Innovative machine learning techniques for security detection problems. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Thesis, University of Technology, Sydney. Accessed January 17, 2020. http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Web. 17 Jan 2020.

Vancouver:

Tran T. Innovative machine learning techniques for security detection problems. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tran T. Innovative machine learning techniques for security detection problems. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Yu Yang, Peng. Detecting Botnet-based Joint Attacks by Hidden Markov Model.

Degree: Master, Information Management, 2012, NSYSU

 We present a new detection model include monitoring network perimeter and hosts logs to counter the new method of attacking involve different hosts source during… (more)

Subjects/Keywords: Intrusion Detection System; Botnet; Hidden Markov Chain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu Yang, P. (2012). Detecting Botnet-based Joint Attacks by Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed January 17, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Web. 17 Jan 2020.

Vancouver:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Jan 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Chen, Po-Chun. Experience-Based Cyber Security Analytics.

Degree: PhD, Computer Science and Engineering, 2010, Penn State University

 As the demand for computational resources and connectivity increases and contemporary computer network systems become more complex, the management of cyber security is progressively becoming… (more)

Subjects/Keywords: Cyber Situation Awareness; Intrusion Detection; Situation Recognition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, P. (2010). Experience-Based Cyber Security Analytics. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/11363

Chicago Manual of Style (16th Edition):

Chen, Po-Chun. “Experience-Based Cyber Security Analytics.” 2010. Doctoral Dissertation, Penn State University. Accessed January 17, 2020. https://etda.libraries.psu.edu/catalog/11363.

MLA Handbook (7th Edition):

Chen, Po-Chun. “Experience-Based Cyber Security Analytics.” 2010. Web. 17 Jan 2020.

Vancouver:

Chen P. Experience-Based Cyber Security Analytics. [Internet] [Doctoral dissertation]. Penn State University; 2010. [cited 2020 Jan 17]. Available from: https://etda.libraries.psu.edu/catalog/11363.

Council of Science Editors:

Chen P. Experience-Based Cyber Security Analytics. [Doctoral Dissertation]. Penn State University; 2010. Available from: https://etda.libraries.psu.edu/catalog/11363

19. Wang, Zhuo. Using Neural Networks in Intrusion Detection System for Cloud Computing .

Degree: 2014, California State University – San Marcos

 Information security is an issue of global concern nowadays. The complexity, accessibility, and extensiveness of the Internet have led to tremendous increase of security risk… (more)

Subjects/Keywords: Neural Networks; Intrusion Detection System; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2014). Using Neural Networks in Intrusion Detection System for Cloud Computing . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Thesis, California State University – San Marcos. Accessed January 17, 2020. http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Web. 17 Jan 2020.

Vancouver:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Internet] [Thesis]. California State University – San Marcos; 2014. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Thesis]. California State University – San Marcos; 2014. Available from: http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

20. Bin Aftab, Muhammad Usama. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.

Degree: Department of Electrical and Computer Engineering, 2015, University of Victoria

 Network security is an important domain in the field of computer engineering. Sensitive information flowing across computer networks is vulnerable to potential threats, therefore it… (more)

Subjects/Keywords: wireless; mesh networks; intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bin Aftab, M. U. (2015). A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/6984

Chicago Manual of Style (16th Edition):

Bin Aftab, Muhammad Usama. “A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.” 2015. Masters Thesis, University of Victoria. Accessed January 17, 2020. http://hdl.handle.net/1828/6984.

MLA Handbook (7th Edition):

Bin Aftab, Muhammad Usama. “A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.” 2015. Web. 17 Jan 2020.

Vancouver:

Bin Aftab MU. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. [Internet] [Masters thesis]. University of Victoria; 2015. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1828/6984.

Council of Science Editors:

Bin Aftab MU. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. [Masters Thesis]. University of Victoria; 2015. Available from: http://hdl.handle.net/1828/6984


University of Victoria

21. Wang, Hongrui. Online intrusion detection design and implementation for SCADA networks.

Degree: Department of Electrical and Computer Engineering, 2017, University of Victoria

 The standardization and interconnection of supervisory control and data acquisition (SCADA) systems has exposed the systems to cyber attacks. To improve the security of the… (more)

Subjects/Keywords: Intrusion detection; SCADA networks; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2017). Online intrusion detection design and implementation for SCADA networks. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/7984

Chicago Manual of Style (16th Edition):

Wang, Hongrui. “Online intrusion detection design and implementation for SCADA networks.” 2017. Masters Thesis, University of Victoria. Accessed January 17, 2020. http://hdl.handle.net/1828/7984.

MLA Handbook (7th Edition):

Wang, Hongrui. “Online intrusion detection design and implementation for SCADA networks.” 2017. Web. 17 Jan 2020.

Vancouver:

Wang H. Online intrusion detection design and implementation for SCADA networks. [Internet] [Masters thesis]. University of Victoria; 2017. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1828/7984.

Council of Science Editors:

Wang H. Online intrusion detection design and implementation for SCADA networks. [Masters Thesis]. University of Victoria; 2017. Available from: http://hdl.handle.net/1828/7984


Virginia Tech

22. Dunning, John Paul. Bluetooth Threat Taxonomy.

Degree: MS, Computer Science, 2010, Virginia Tech

 Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology… (more)

Subjects/Keywords: Intrusion Detection; Taxonomy; Security; Bluetooth; Exploit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dunning, J. P. (2010). Bluetooth Threat Taxonomy. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76883

Chicago Manual of Style (16th Edition):

Dunning, John Paul. “Bluetooth Threat Taxonomy.” 2010. Masters Thesis, Virginia Tech. Accessed January 17, 2020. http://hdl.handle.net/10919/76883.

MLA Handbook (7th Edition):

Dunning, John Paul. “Bluetooth Threat Taxonomy.” 2010. Web. 17 Jan 2020.

Vancouver:

Dunning JP. Bluetooth Threat Taxonomy. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10919/76883.

Council of Science Editors:

Dunning JP. Bluetooth Threat Taxonomy. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/76883

23. Sakthivelmurugan, Sakthiyuvaraja. An empirical approach to modeling uncertainty in intrusion analysis.

Degree: MS, Department of Computing and Information Sciences, 2009, Kansas State University

 A well-known problem in current intrusion detection tools is that they create too many low-level alerts and system administrators find it hard to cope up… (more)

Subjects/Keywords: Intrusion Detection; Uncertainty; Logic; Computer Science (0984)

Page 1 Page 2 Page 3 Page 4 Page 5 Sample image Sample image Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sakthivelmurugan, S. (2009). An empirical approach to modeling uncertainty in intrusion analysis. (Masters Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/2337

Chicago Manual of Style (16th Edition):

Sakthivelmurugan, Sakthiyuvaraja. “An empirical approach to modeling uncertainty in intrusion analysis.” 2009. Masters Thesis, Kansas State University. Accessed January 17, 2020. http://hdl.handle.net/2097/2337.

MLA Handbook (7th Edition):

Sakthivelmurugan, Sakthiyuvaraja. “An empirical approach to modeling uncertainty in intrusion analysis.” 2009. Web. 17 Jan 2020.

Vancouver:

Sakthivelmurugan S. An empirical approach to modeling uncertainty in intrusion analysis. [Internet] [Masters thesis]. Kansas State University; 2009. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/2097/2337.

Council of Science Editors:

Sakthivelmurugan S. An empirical approach to modeling uncertainty in intrusion analysis. [Masters Thesis]. Kansas State University; 2009. Available from: http://hdl.handle.net/2097/2337


University of Melbourne

24. WAHID, ALIF. Estimating the Internet malicious host population while preserving privacy.

Degree: 2013, University of Melbourne

 The Internet is a globally significant infrastructure that attracts a large number of threats posed by the population of malicious hosts within it. These threats… (more)

Subjects/Keywords: intrusion detection; privacy protection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

WAHID, A. (2013). Estimating the Internet malicious host population while preserving privacy. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/38139

Chicago Manual of Style (16th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Doctoral Dissertation, University of Melbourne. Accessed January 17, 2020. http://hdl.handle.net/11343/38139.

MLA Handbook (7th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Web. 17 Jan 2020.

Vancouver:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Internet] [Doctoral dissertation]. University of Melbourne; 2013. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/11343/38139.

Council of Science Editors:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Doctoral Dissertation]. University of Melbourne; 2013. Available from: http://hdl.handle.net/11343/38139


University of Houston

25. Zhang, Hongyang 1988-. Detecting Network Intruders by Examining Packet Crossovers in Connections.

Degree: Computer Science, Department of, 2014, University of Houston

 Routing packet traffic through a chain of hosts is a common technique for hackers to attack a victim machine without exposing themselves. Generally, a long… (more)

Subjects/Keywords: Intrusion detection; Stepping-stone; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. 1. (2014). Detecting Network Intruders by Examining Packet Crossovers in Connections. (Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/867

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Hongyang 1988-. “Detecting Network Intruders by Examining Packet Crossovers in Connections.” 2014. Thesis, University of Houston. Accessed January 17, 2020. http://hdl.handle.net/10657/867.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Hongyang 1988-. “Detecting Network Intruders by Examining Packet Crossovers in Connections.” 2014. Web. 17 Jan 2020.

Vancouver:

Zhang H1. Detecting Network Intruders by Examining Packet Crossovers in Connections. [Internet] [Thesis]. University of Houston; 2014. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10657/867.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang H1. Detecting Network Intruders by Examining Packet Crossovers in Connections. [Thesis]. University of Houston; 2014. Available from: http://hdl.handle.net/10657/867

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

26. Zaman, Safaa. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.

Degree: 2009, University of Waterloo

 A variety of intrusion prevention techniques, such as user authentication (e.g.: using passwords), avoidance of programming errors, and information protection, have been used to protect… (more)

Subjects/Keywords: Intrusion Detection Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaman, S. (2009). A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4505

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zaman, Safaa. “A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.” 2009. Thesis, University of Waterloo. Accessed January 17, 2020. http://hdl.handle.net/10012/4505.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zaman, Safaa. “A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.” 2009. Web. 17 Jan 2020.

Vancouver:

Zaman S. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. [Internet] [Thesis]. University of Waterloo; 2009. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10012/4505.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zaman S. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. [Thesis]. University of Waterloo; 2009. Available from: http://hdl.handle.net/10012/4505

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

27. Creech, Gideon. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.

Degree: Engineering & Information Technology, 2014, University of New South Wales

 Current anomaly host-based intrusion detection systems are limited in accuracy with any increase in detection rate resulting in a corresponding increase in false alarm rate.… (more)

Subjects/Keywords: Hacking; Intrusion detection; Zero-day attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Creech, G. (2014). Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Creech, Gideon. “Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.” 2014. Doctoral Dissertation, University of New South Wales. Accessed January 17, 2020. http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true.

MLA Handbook (7th Edition):

Creech, Gideon. “Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.” 2014. Web. 17 Jan 2020.

Vancouver:

Creech G. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. [Internet] [Doctoral dissertation]. University of New South Wales; 2014. [cited 2020 Jan 17]. Available from: http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true.

Council of Science Editors:

Creech G. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. [Doctoral Dissertation]. University of New South Wales; 2014. Available from: http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true


Colorado State University

28. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; Network Security; Intrusion Detection System; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 17, 2020. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 17 Jan 2020.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362


Florida International University

29. Jing, Xueyan. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.

Degree: PhD, Electrical Engineering, 2016, Florida International University

Intrusion detection is the essential part of network security in combating against illegal network access or malicious cyberattacks. Due to the constantly evolving nature… (more)

Subjects/Keywords: intrusion detection; classification; fuzzy; Dempster-shafer theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jing, X. (2016). Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. (Doctoral Dissertation). Florida International University. Retrieved from https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288

Chicago Manual of Style (16th Edition):

Jing, Xueyan. “Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.” 2016. Doctoral Dissertation, Florida International University. Accessed January 17, 2020. https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288.

MLA Handbook (7th Edition):

Jing, Xueyan. “Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.” 2016. Web. 17 Jan 2020.

Vancouver:

Jing X. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. [Internet] [Doctoral dissertation]. Florida International University; 2016. [cited 2020 Jan 17]. Available from: https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288.

Council of Science Editors:

Jing X. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. [Doctoral Dissertation]. Florida International University; 2016. Available from: https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288

30. Singh, Jatinder. Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN).

Degree: 2012, Punjabi University; University College of Engineering

 Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. In recent years, the proliferation of wireless devices coupled with… (more)

Subjects/Keywords: WLAN; Computer Engineering; Intrusion Detection Techniques; Wireless Local Area Network (WLAN); Intrusion Detection; Wormhole attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, J. (2012). Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN). (Thesis). Punjabi University; University College of Engineering. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/3650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Singh, Jatinder. “Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN).” 2012. Thesis, Punjabi University; University College of Engineering. Accessed January 17, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/3650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Singh, Jatinder. “Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN).” 2012. Web. 17 Jan 2020.

Vancouver:

Singh J. Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN). [Internet] [Thesis]. Punjabi University; University College of Engineering; 2012. [cited 2020 Jan 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/3650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Singh J. Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN). [Thesis]. Punjabi University; University College of Engineering; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/3650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [18]

.