Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Intrusion Detection). Showing records 1 – 30 of 565 total matches.

[1] [2] [3] [4] [5] … [19]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Guelph

1. Nyakundi, Eric. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.

Degree: MS, School of Computer Science, 2015, University of Guelph

 Recent increase in hacks and computer network attacks around the world, including Sony Pictures (2014), Home Depot (2014), and Target (2014) gives a compelling need… (more)

Subjects/Keywords: Support Vector Machines; Intrusion detection systems; Anomaly intrusion detection; Network intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyakundi, E. (2015). USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. (Masters Thesis). University of Guelph. Retrieved from https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880

Chicago Manual of Style (16th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.” 2015. Masters Thesis, University of Guelph. Accessed January 23, 2021. https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

MLA Handbook (7th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.” 2015. Web. 23 Jan 2021.

Vancouver:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. [Internet] [Masters thesis]. University of Guelph; 2015. [cited 2021 Jan 23]. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

Council of Science Editors:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. [Masters Thesis]. University of Guelph; 2015. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880

2. Ferreira, Eduardo Alves. Detecção autônoma de intrusões utilizando aprendizado de máquina.

Degree: Mestrado, Ciências de Computação e Matemática Computacional, 2011, University of São Paulo

A evolução da tecnologia da informação popularizou o uso de sistemas computacionais para a automação de tarefas operacionais. As tarefas de implantação e manutenção desses… (more)

Subjects/Keywords: Detecção de intrusão; Intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, E. A. (2011). Detecção autônoma de intrusões utilizando aprendizado de máquina. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;

Chicago Manual of Style (16th Edition):

Ferreira, Eduardo Alves. “Detecção autônoma de intrusões utilizando aprendizado de máquina.” 2011. Masters Thesis, University of São Paulo. Accessed January 23, 2021. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;.

MLA Handbook (7th Edition):

Ferreira, Eduardo Alves. “Detecção autônoma de intrusões utilizando aprendizado de máquina.” 2011. Web. 23 Jan 2021.

Vancouver:

Ferreira EA. Detecção autônoma de intrusões utilizando aprendizado de máquina. [Internet] [Masters thesis]. University of São Paulo; 2011. [cited 2021 Jan 23]. Available from: http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;.

Council of Science Editors:

Ferreira EA. Detecção autônoma de intrusões utilizando aprendizado de máquina. [Masters Thesis]. University of São Paulo; 2011. Available from: http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/ ;

3. Victor, Ganta Jacob. Intrusion Detection Systems False Positives;.

Degree: Compute Science Engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Computers and internet have become a part of human life, to address security challenges tools like Anti-viruses, Firewalls, Intrusion Detection Systems (IDS) etc. are deployed.… (more)

Subjects/Keywords: Detection; False; Intrusion; Positives; Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Victor, G. J. (2013). Intrusion Detection Systems False Positives;. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed January 23, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Web. 23 Jan 2021.

Vancouver:

Victor GJ. Intrusion Detection Systems False Positives;. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2021 Jan 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Victor GJ. Intrusion Detection Systems False Positives;. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Jha, Manjari. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.

Degree: 2018, Penn State University

 This thesis focuses on developing probabilistic models for the analysis of diverse datasets using unsupervised clustering techniques. Primarily, we focus on two main fields: the… (more)

Subjects/Keywords: metagenomics; intrusion detection; clustering; unsupervised

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jha, M. (2018). Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Thesis, Penn State University. Accessed January 23, 2021. https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Web. 23 Jan 2021.

Vancouver:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Jan 23]. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

5. Seifert, Christian. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.

Degree: 2010, Victoria University of Wellington

 With the increasing connectivity of and reliance on computers and networks, important aspects of computer systems are under a constant threat. In particular, drive-by-download attacks… (more)

Subjects/Keywords: Intrusion detection; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifert, C. (2010). Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1385

Chicago Manual of Style (16th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Doctoral Dissertation, Victoria University of Wellington. Accessed January 23, 2021. http://hdl.handle.net/10063/1385.

MLA Handbook (7th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Web. 23 Jan 2021.

Vancouver:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2010. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10063/1385.

Council of Science Editors:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Doctoral Dissertation]. Victoria University of Wellington; 2010. Available from: http://hdl.handle.net/10063/1385


North-West University

6. Ohaeri, Ifeoma Ugochi. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .

Degree: 2012, North-West University

 With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as… (more)

Subjects/Keywords: Intrusion detection systems; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohaeri, I. U. (2012). Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Thesis, North-West University. Accessed January 23, 2021. http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Web. 23 Jan 2021.

Vancouver:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Internet] [Thesis]. North-West University; 2012. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Thesis]. North-West University; 2012. Available from: http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Han, Lu. Indicators of Compromise of Vehicular Systems .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology

 Modern vehicles are no longer mere mechanical devices; they are equipped with plenty of sensors and Electronic Control Units (ECUs) for their primary functions such… (more)

Subjects/Keywords: IDS; Intrusion; Detection; ECU; IOC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Han, L. (2019). Indicators of Compromise of Vehicular Systems . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Thesis, Chalmers University of Technology. Accessed January 23, 2021. http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Web. 23 Jan 2021.

Vancouver:

Han L. Indicators of Compromise of Vehicular Systems . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Han L. Indicators of Compromise of Vehicular Systems . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

8. DeFreeuw, Jonathan Daniel. Embedding Network Information for Machine Learning-based Intrusion Detection.

Degree: MS, Computer Engineering, 2019, Virginia Tech

 As computer networks grow and demonstrate more complicated and intricate behaviors, traditional intrusion detections systems have fallen behind in their ability to protect network resources.… (more)

Subjects/Keywords: word embeddings; intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DeFreeuw, J. D. (2019). Embedding Network Information for Machine Learning-based Intrusion Detection. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/99342

Chicago Manual of Style (16th Edition):

DeFreeuw, Jonathan Daniel. “Embedding Network Information for Machine Learning-based Intrusion Detection.” 2019. Masters Thesis, Virginia Tech. Accessed January 23, 2021. http://hdl.handle.net/10919/99342.

MLA Handbook (7th Edition):

DeFreeuw, Jonathan Daniel. “Embedding Network Information for Machine Learning-based Intrusion Detection.” 2019. Web. 23 Jan 2021.

Vancouver:

DeFreeuw JD. Embedding Network Information for Machine Learning-based Intrusion Detection. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10919/99342.

Council of Science Editors:

DeFreeuw JD. Embedding Network Information for Machine Learning-based Intrusion Detection. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/99342


Oklahoma State University

9. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed January 23, 2021. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 23 Jan 2021.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

10. Celik, Zeynel Berkay. Salting Public Traces with Attack Traffic to Test Flow Classifiers .

Degree: 2011, Penn State University

 We consider the problem of using flow-level data for detection of botnet command and control (C&C) activity. We find that current approaches do not consider… (more)

Subjects/Keywords: security; classification; botnet detection; netflow; intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Celik, Z. B. (2011). Salting Public Traces with Attack Traffic to Test Flow Classifiers . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Celik, Zeynel Berkay. “Salting Public Traces with Attack Traffic to Test Flow Classifiers .” 2011. Thesis, Penn State University. Accessed January 23, 2021. https://submit-etda.libraries.psu.edu/catalog/12196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Celik, Zeynel Berkay. “Salting Public Traces with Attack Traffic to Test Flow Classifiers .” 2011. Web. 23 Jan 2021.

Vancouver:

Celik ZB. Salting Public Traces with Attack Traffic to Test Flow Classifiers . [Internet] [Thesis]. Penn State University; 2011. [cited 2021 Jan 23]. Available from: https://submit-etda.libraries.psu.edu/catalog/12196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Celik ZB. Salting Public Traces with Attack Traffic to Test Flow Classifiers . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Houston

11. Ding, Wei 1983-. Detecting Network Intruders Connected Through Long Stepping-stone Chains.

Degree: PhD, Computer Science, 2014, University of Houston

 A common technique hackers use to avoid being detected is to route their network connections through a chain of stepping-stone hosts. There is no valid… (more)

Subjects/Keywords: Intrusion detection; Network Security; Stepping-stone Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ding, W. 1. (2014). Detecting Network Intruders Connected Through Long Stepping-stone Chains. (Doctoral Dissertation). University of Houston. Retrieved from http://hdl.handle.net/10657/4747

Chicago Manual of Style (16th Edition):

Ding, Wei 1983-. “Detecting Network Intruders Connected Through Long Stepping-stone Chains.” 2014. Doctoral Dissertation, University of Houston. Accessed January 23, 2021. http://hdl.handle.net/10657/4747.

MLA Handbook (7th Edition):

Ding, Wei 1983-. “Detecting Network Intruders Connected Through Long Stepping-stone Chains.” 2014. Web. 23 Jan 2021.

Vancouver:

Ding W1. Detecting Network Intruders Connected Through Long Stepping-stone Chains. [Internet] [Doctoral dissertation]. University of Houston; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10657/4747.

Council of Science Editors:

Ding W1. Detecting Network Intruders Connected Through Long Stepping-stone Chains. [Doctoral Dissertation]. University of Houston; 2014. Available from: http://hdl.handle.net/10657/4747

12. Chevalier, Ronny. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.

Degree: Docteur es, Informatique (STIC), 2019, CentraleSupélec

Les systèmes informatiques, tels que les ordinateurs portables ou les systèmes embarqués, sont construits avec des couches de mécanismes de sécurité préventifs afin de réduire… (more)

Subjects/Keywords: Sécurité; Détection d’intrusion; Réponse aux intrusions; Survivabilité; Security; Intrusion detection; Intrusion response; Intrusion recovery; Survivability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chevalier, R. (2019). Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. (Doctoral Dissertation). CentraleSupélec. Retrieved from http://www.theses.fr/2019CSUP0003

Chicago Manual of Style (16th Edition):

Chevalier, Ronny. “Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.” 2019. Doctoral Dissertation, CentraleSupélec. Accessed January 23, 2021. http://www.theses.fr/2019CSUP0003.

MLA Handbook (7th Edition):

Chevalier, Ronny. “Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.” 2019. Web. 23 Jan 2021.

Vancouver:

Chevalier R. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. [Internet] [Doctoral dissertation]. CentraleSupélec; 2019. [cited 2021 Jan 23]. Available from: http://www.theses.fr/2019CSUP0003.

Council of Science Editors:

Chevalier R. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. [Doctoral Dissertation]. CentraleSupélec; 2019. Available from: http://www.theses.fr/2019CSUP0003


University of Western Ontario

13. Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. Hidden Markov Model Based Intrusion Alert Prediction.

Degree: 2016, University of Western Ontario

Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions is the next step to provide an active defense against incoming… (more)

Subjects/Keywords: Feature Reduction; HMM; Intrusion Alerts; Intrusion Detection; Intrusion Prediction; Other Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miriya Thanthrige, U. S. K. P. (2016). Hidden Markov Model Based Intrusion Alert Prediction. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Thesis, University of Western Ontario. Accessed January 23, 2021. https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Web. 23 Jan 2021.

Vancouver:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Internet] [Thesis]. University of Western Ontario; 2016. [cited 2021 Jan 23]. Available from: https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Thesis]. University of Western Ontario; 2016. Available from: https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

14. Yadav, Meeta. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.

Degree: PhD, Computer Engineering, 2009, North Carolina State University

 YADAV, MEETA. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection. (Under the direction of Professor Paul D. Franzon). Intrusion detection systems protect… (more)

Subjects/Keywords: Network Intrusion Prevention; Hardware Architecture; Security; Network Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yadav, M. (2009). Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5601

Chicago Manual of Style (16th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Doctoral Dissertation, North Carolina State University. Accessed January 23, 2021. http://www.lib.ncsu.edu/resolver/1840.16/5601.

MLA Handbook (7th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Web. 23 Jan 2021.

Vancouver:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2021 Jan 23]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601.

Council of Science Editors:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601


NSYSU

15. Yu Yang, Peng. Detecting Botnet-based Joint Attacks by Hidden Markov Model.

Degree: Master, Information Management, 2012, NSYSU

 We present a new detection model include monitoring network perimeter and hosts logs to counter the new method of attacking involve different hosts source during… (more)

Subjects/Keywords: Intrusion Detection System; Botnet; Hidden Markov Chain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu Yang, P. (2012). Detecting Botnet-based Joint Attacks by Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Web. 23 Jan 2021.

Vancouver:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

16. Sridhar, Srikumar. Testbed Design For Evaluation Of Active Cyber Defense Systems.

Degree: 2018, Penn State University

 As with any system, often times, an attacker only needs to know a single vulnerability to compromise the entire system. To ensure a system is… (more)

Subjects/Keywords: Moving Target Defense; Container Migration; Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sridhar, S. (2018). Testbed Design For Evaluation Of Active Cyber Defense Systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Thesis, Penn State University. Accessed January 23, 2021. https://submit-etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Web. 23 Jan 2021.

Vancouver:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Jan 23]. Available from: https://submit-etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

17. Cole, Robert James. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.

Degree: 2013, Penn State University

 Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are… (more)

Subjects/Keywords: intrusion detection; IDS; uncertainty; Bayesian modeling; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cole, R. J. (2013). Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cole, Robert James. “Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.” 2013. Thesis, Penn State University. Accessed January 23, 2021. https://submit-etda.libraries.psu.edu/catalog/17035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cole, Robert James. “Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.” 2013. Web. 23 Jan 2021.

Vancouver:

Cole RJ. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. [Internet] [Thesis]. Penn State University; 2013. [cited 2021 Jan 23]. Available from: https://submit-etda.libraries.psu.edu/catalog/17035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cole RJ. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/17035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Chen, Po-Chun. Experience-Based Cyber Security Analytics.

Degree: 2011, Penn State University

 As the demand for computational resources and connectivity increases and contemporary computer network systems become more complex, the management of cyber security is progressively becoming… (more)

Subjects/Keywords: Cyber Situation Awareness; Intrusion Detection; Situation Recognition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, P. (2011). Experience-Based Cyber Security Analytics. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/11363

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Po-Chun. “Experience-Based Cyber Security Analytics.” 2011. Thesis, Penn State University. Accessed January 23, 2021. https://submit-etda.libraries.psu.edu/catalog/11363.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Po-Chun. “Experience-Based Cyber Security Analytics.” 2011. Web. 23 Jan 2021.

Vancouver:

Chen P. Experience-Based Cyber Security Analytics. [Internet] [Thesis]. Penn State University; 2011. [cited 2021 Jan 23]. Available from: https://submit-etda.libraries.psu.edu/catalog/11363.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen P. Experience-Based Cyber Security Analytics. [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/11363

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

19. Naidoo, Tyrone. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.

Degree: 2016, University of KwaZulu-Natal

 In recent years, there has been a rapid increase in Internet usage, which has in turn led to a rise in malicious network activity. Network… (more)

Subjects/Keywords: Computer engineering.; Network Intrusion Detection Systems (NIDS).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naidoo, T. (2016). Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Naidoo, Tyrone. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.” 2016. Thesis, University of KwaZulu-Natal. Accessed January 23, 2021. http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Naidoo, Tyrone. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.” 2016. Web. 23 Jan 2021.

Vancouver:

Naidoo T. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Naidoo T. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Houston

20. Zhang, Hongyang 1988-. Detecting Network Intruders by Examining Packet Crossovers in Connections.

Degree: MS, Computer Science, 2014, University of Houston

 Routing packet traffic through a chain of hosts is a common technique for hackers to attack a victim machine without exposing themselves. Generally, a long… (more)

Subjects/Keywords: Intrusion detection; Stepping-stone; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. 1. (2014). Detecting Network Intruders by Examining Packet Crossovers in Connections. (Masters Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/867

Chicago Manual of Style (16th Edition):

Zhang, Hongyang 1988-. “Detecting Network Intruders by Examining Packet Crossovers in Connections.” 2014. Masters Thesis, University of Houston. Accessed January 23, 2021. http://hdl.handle.net/10657/867.

MLA Handbook (7th Edition):

Zhang, Hongyang 1988-. “Detecting Network Intruders by Examining Packet Crossovers in Connections.” 2014. Web. 23 Jan 2021.

Vancouver:

Zhang H1. Detecting Network Intruders by Examining Packet Crossovers in Connections. [Internet] [Masters thesis]. University of Houston; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10657/867.

Council of Science Editors:

Zhang H1. Detecting Network Intruders by Examining Packet Crossovers in Connections. [Masters Thesis]. University of Houston; 2014. Available from: http://hdl.handle.net/10657/867


Florida International University

21. Jing, Xueyan. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.

Degree: PhD, Electrical Engineering, 2016, Florida International University

Intrusion detection is the essential part of network security in combating against illegal network access or malicious cyberattacks. Due to the constantly evolving nature… (more)

Subjects/Keywords: intrusion detection; classification; fuzzy; Dempster-shafer theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jing, X. (2016). Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. (Doctoral Dissertation). Florida International University. Retrieved from https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288

Chicago Manual of Style (16th Edition):

Jing, Xueyan. “Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.” 2016. Doctoral Dissertation, Florida International University. Accessed January 23, 2021. https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288.

MLA Handbook (7th Edition):

Jing, Xueyan. “Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection.” 2016. Web. 23 Jan 2021.

Vancouver:

Jing X. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. [Internet] [Doctoral dissertation]. Florida International University; 2016. [cited 2021 Jan 23]. Available from: https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288.

Council of Science Editors:

Jing X. Innovative Two-Stage Fuzzy Classification for Unknown Intrusion Detection. [Doctoral Dissertation]. Florida International University; 2016. Available from: https://digitalcommons.fiu.edu/etd/2436 ; 10.25148/etd.FIDC000288 ; FIDC000288


University of Victoria

22. Wang, Hongrui. Online intrusion detection design and implementation for SCADA networks.

Degree: Department of Electrical and Computer Engineering, 2017, University of Victoria

 The standardization and interconnection of supervisory control and data acquisition (SCADA) systems has exposed the systems to cyber attacks. To improve the security of the… (more)

Subjects/Keywords: Intrusion detection; SCADA networks; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2017). Online intrusion detection design and implementation for SCADA networks. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/7984

Chicago Manual of Style (16th Edition):

Wang, Hongrui. “Online intrusion detection design and implementation for SCADA networks.” 2017. Masters Thesis, University of Victoria. Accessed January 23, 2021. http://hdl.handle.net/1828/7984.

MLA Handbook (7th Edition):

Wang, Hongrui. “Online intrusion detection design and implementation for SCADA networks.” 2017. Web. 23 Jan 2021.

Vancouver:

Wang H. Online intrusion detection design and implementation for SCADA networks. [Internet] [Masters thesis]. University of Victoria; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1828/7984.

Council of Science Editors:

Wang H. Online intrusion detection design and implementation for SCADA networks. [Masters Thesis]. University of Victoria; 2017. Available from: http://hdl.handle.net/1828/7984

23. Chuluundorj, Zorigtbaatar. Augmenting Network Flows with User Interface Context to Inform Access Control Decisions.

Degree: MS, 2019, Worcester Polytechnic Institute

  Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious… (more)

Subjects/Keywords: Cybersecurity; Intrusion Detection System; Dynamic Whitelists

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuluundorj, Z. (2019). Augmenting Network Flows with User Interface Context to Inform Access Control Decisions. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-3101 ; https://digitalcommons.wpi.edu/etd-theses/1331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chuluundorj, Zorigtbaatar. “Augmenting Network Flows with User Interface Context to Inform Access Control Decisions.” 2019. Thesis, Worcester Polytechnic Institute. Accessed January 23, 2021. etd-3101 ; https://digitalcommons.wpi.edu/etd-theses/1331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chuluundorj, Zorigtbaatar. “Augmenting Network Flows with User Interface Context to Inform Access Control Decisions.” 2019. Web. 23 Jan 2021.

Vancouver:

Chuluundorj Z. Augmenting Network Flows with User Interface Context to Inform Access Control Decisions. [Internet] [Thesis]. Worcester Polytechnic Institute; 2019. [cited 2021 Jan 23]. Available from: etd-3101 ; https://digitalcommons.wpi.edu/etd-theses/1331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chuluundorj Z. Augmenting Network Flows with User Interface Context to Inform Access Control Decisions. [Thesis]. Worcester Polytechnic Institute; 2019. Available from: etd-3101 ; https://digitalcommons.wpi.edu/etd-theses/1331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

24. Bin Aftab, Muhammad Usama. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.

Degree: Department of Electrical and Computer Engineering, 2015, University of Victoria

 Network security is an important domain in the field of computer engineering. Sensitive information flowing across computer networks is vulnerable to potential threats, therefore it… (more)

Subjects/Keywords: wireless; mesh networks; intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bin Aftab, M. U. (2015). A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/6984

Chicago Manual of Style (16th Edition):

Bin Aftab, Muhammad Usama. “A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.” 2015. Masters Thesis, University of Victoria. Accessed January 23, 2021. http://hdl.handle.net/1828/6984.

MLA Handbook (7th Edition):

Bin Aftab, Muhammad Usama. “A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks.” 2015. Web. 23 Jan 2021.

Vancouver:

Bin Aftab MU. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. [Internet] [Masters thesis]. University of Victoria; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1828/6984.

Council of Science Editors:

Bin Aftab MU. A Hybrid Framework for Intrusion Detection in Wireless Mesh Networks. [Masters Thesis]. University of Victoria; 2015. Available from: http://hdl.handle.net/1828/6984


University of New Mexico

25. Fugate, Sunny. Methods for speculatively bootstrapping better intrusion detection system performance.

Degree: Department of Computer Science, 2012, University of New Mexico

 During the last three decades, the designers of computer IDSs have been continuously challenged with performance bottlenecks and scalability issues. The number of threats is… (more)

Subjects/Keywords: intrusion detection; performance optimization; speculative optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fugate, S. (2012). Methods for speculatively bootstrapping better intrusion detection system performance. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/22040

Chicago Manual of Style (16th Edition):

Fugate, Sunny. “Methods for speculatively bootstrapping better intrusion detection system performance.” 2012. Doctoral Dissertation, University of New Mexico. Accessed January 23, 2021. http://hdl.handle.net/1928/22040.

MLA Handbook (7th Edition):

Fugate, Sunny. “Methods for speculatively bootstrapping better intrusion detection system performance.” 2012. Web. 23 Jan 2021.

Vancouver:

Fugate S. Methods for speculatively bootstrapping better intrusion detection system performance. [Internet] [Doctoral dissertation]. University of New Mexico; 2012. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1928/22040.

Council of Science Editors:

Fugate S. Methods for speculatively bootstrapping better intrusion detection system performance. [Doctoral Dissertation]. University of New Mexico; 2012. Available from: http://hdl.handle.net/1928/22040

26. Badger, Eric C. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 This work explores a scalable data analytics pipeline for real-time attack detection through the use of customized honeypots at the National Center for Supercomputing Applications… (more)

Subjects/Keywords: Intrusion Detection

Detection System ICSI International Computer Science Institute IDS Intrusion Detection System… …Network-based Intrusion Detection System (NIDS). Unlike OSSEC, Bro is running directly… …Comma-separated Values DDoS Distributed Denial of Service HIDS Host-based Intrusion… …Registry NCSA National Center for Supercomputing Applications NIDS Network-based Intrusion… …Detection System NSF National Science Foundation OS Operating System OSSEC Open Source… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badger, E. C. (2015). Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed January 23, 2021. http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Web. 23 Jan 2021.

Vancouver:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

27. WAHID, ALIF. Estimating the Internet malicious host population while preserving privacy.

Degree: 2013, University of Melbourne

 The Internet is a globally significant infrastructure that attracts a large number of threats posed by the population of malicious hosts within it. These threats… (more)

Subjects/Keywords: intrusion detection; privacy protection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

WAHID, A. (2013). Estimating the Internet malicious host population while preserving privacy. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/38139

Chicago Manual of Style (16th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Doctoral Dissertation, University of Melbourne. Accessed January 23, 2021. http://hdl.handle.net/11343/38139.

MLA Handbook (7th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Web. 23 Jan 2021.

Vancouver:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Internet] [Doctoral dissertation]. University of Melbourne; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/11343/38139.

Council of Science Editors:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Doctoral Dissertation]. University of Melbourne; 2013. Available from: http://hdl.handle.net/11343/38139

28. Wang, Zhuo. Using Neural Networks in Intrusion Detection System for Cloud Computing .

Degree: 2014, California State University – San Marcos

 Information security is an issue of global concern nowadays. The complexity, accessibility, and extensiveness of the Internet have led to tremendous increase of security risk… (more)

Subjects/Keywords: Neural Networks; Intrusion Detection System; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2014). Using Neural Networks in Intrusion Detection System for Cloud Computing . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Thesis, California State University – San Marcos. Accessed January 23, 2021. http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Web. 23 Jan 2021.

Vancouver:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Internet] [Thesis]. California State University – San Marcos; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Thesis]. California State University – San Marcos; 2014. Available from: http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

29. Zaman, Safaa. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.

Degree: 2009, University of Waterloo

 A variety of intrusion prevention techniques, such as user authentication (e.g.: using passwords), avoidance of programming errors, and information protection, have been used to protect… (more)

Subjects/Keywords: Intrusion Detection Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaman, S. (2009). A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4505

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zaman, Safaa. “A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.” 2009. Thesis, University of Waterloo. Accessed January 23, 2021. http://hdl.handle.net/10012/4505.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zaman, Safaa. “A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules.” 2009. Web. 23 Jan 2021.

Vancouver:

Zaman S. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. [Internet] [Thesis]. University of Waterloo; 2009. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10012/4505.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zaman S. A Collaborative Architecture for Distributed Intrusion Detection System based on Lightweight Modules. [Thesis]. University of Waterloo; 2009. Available from: http://hdl.handle.net/10012/4505

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

30. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; network security; intrusion detection system; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 23 Jan 2021.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362

[1] [2] [3] [4] [5] … [19]

.