咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 28 篇 distributed intr...
  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 3 篇 data security
  • 3 篇 xml
  • 3 篇 big data
  • 3 篇 mobile agent
  • 3 篇 security
  • 2 篇 internet of thin...
  • 2 篇 dids
  • 2 篇 firewalls (compu...
  • 2 篇 online clusterin...
  • 2 篇 smart grids
  • 2 篇 bgp
  • 2 篇 advanced meterin...
  • 2 篇 machine learning
  • 2 篇 intelligent deci...
  • 2 篇 mini-batch k-mea...
  • 2 篇 cloud computing
  • 2 篇 intelligent agen...

机构

  • 1 篇 univ maryland ba...
  • 1 篇 iit dept ctr edu...
  • 1 篇 univ lille 1 lab...
  • 1 篇 masdar inst sci ...
  • 1 篇 sfax univ digita...
  • 1 篇 shandong univ sc...
  • 1 篇 school of inform...
  • 1 篇 n china elect po...
  • 1 篇 department of co...
  • 1 篇 peter great st p...
  • 1 篇 univ fed rio de ...
  • 1 篇 beijing univ pos...
  • 1 篇 wuhan polytechn ...
  • 1 篇 institute center...
  • 1 篇 sch engn & comp ...
  • 1 篇 natl sch elect &...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 univ technol tro...
  • 1 篇 research center ...

作者

  • 2 篇 silva renato s.
  • 1 篇 zhang meixia
  • 1 篇 francisco colom ...
  • 1 篇 lang sd
  • 1 篇 gil david
  • 1 篇 fourati lamia ch...
  • 1 篇 bai yuan
  • 1 篇 bernhard sick
  • 1 篇 suchetana chakra...
  • 1 篇 sukumar nandi
  • 1 篇 sven tomforde
  • 1 篇 de moraes luis f...
  • 1 篇 wang yongkang
  • 1 篇 manuel jimeno an...
  • 1 篇 tafazolli rahim
  • 1 篇 zeyar aung
  • 1 篇 aung zeyar
  • 1 篇 lu xian-liang
  • 1 篇 fadwa abdul aziz...
  • 1 篇 liu wen-tao

语言

  • 26 篇 英文
  • 2 篇 中文
检索条件"主题词=distributed Intrusion Detection System"
28 条 记 录,以下是1-10 订阅
Research on the Application of distributed intrusion detection system in Campus Network
Research on the Application of Distributed Intrusion Detecti...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Wang, Yongkang Zhang, Meixia College of Information Technology Shandong Provinee Weifang City261061 China
The application of distributed intrusion detection system (DIDS) in campus network is a security technology which aims at monitoring and analyzing network attacks. With the increasing number of campus network users an... 详细信息
来源: 评论
A distributed intrusion detection system for Future Smart Grid Metering Network
A Distributed Intrusion Detection System for Future Smart Gr...
收藏 引用
IEEE International Conference on Communications (IEEE ICC)
作者: Chatzimiltis, Sotiris Shojafar, Mohammad Tafazolli, Rahim Univ Surrey ICS 5GIC Guildford Surrey England Univ Surrey ICS 6GIC Guildford Surrey England
Integrating information and communication technologies into the power generation, transmission and distribution system provides a new concept called Smart Grid (SG). The wide variety of devices connected to the SG com... 详细信息
来源: 评论
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
收藏 引用
COMPUTERS & SECURITY 2024年 142卷
作者: Tlili, Fadhila Ayed, Samiha Fourati, Lamia Chaari Natl Sch Elect & Telecommun Sfax Sfax Tunisia Univ Technol Troyes LIST3N ERA Troyes France Sfax Univ Digital Res Ctr Sfax CRNS Lab Signals Syst aRtificial Intelligence & neTwork SMRTS Sfax Tunisia
distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs designed for implementation in distributed environments. Each IDS is integrated into distinct entities within a monitored ne... 详细信息
来源: 评论
A distributed intrusion detection system with Protection from an Internal Intruder
收藏 引用
AUTOMATIC CONTROL AND COMPUTER SCIENCES 2018年 第8期52卷 945-953页
作者: Shterenberg, S. I. Poltavtseva, M. A. Peter Great St Petersburg Polytech Univ St Petersburg 195251 Russia
The protection of modern distributed information networks from external and internal intruders continues to be of great importance due to the development of data transmission and processing technology. The article des... 详细信息
来源: 评论
B-DIDS: MINING ANOMALIES IN A BIG-distributed intrusion detection system  2
B-DIDS: MINING ANOMALIES IN A BIG-DISTRIBUTED INTRUSION DETE...
收藏 引用
IEEE International Conference on Big Data
作者: Janeja, Vandana P. Azari, Ali Namayanja, Josephine M. Heilig, Brian Univ Maryland Baltimore Cty Baltimore MD 21228 USA HAMR Analyt Technol ET Int Newark DE USA
The focus of this paper is to present the architecture of a Big-distributed intrusion detection system (B-dIDS) to discover multi-pronged attacks which are anomalies existing across multiple subnets in a distributed n... 详细信息
来源: 评论
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2024年 第11-12期79卷 901-912页
作者: Silva, Renato S. de Assis, Felipe M. F. Macedo, Evandro L. C. de Moraes, Luis Felipe M. Univ Fed Rio De Janeiro High Speed Networks Lab PESC COPPE Ave Horacio Macedo2030 Cidade Univ BR-21941914 Rio De Janeiro RJ Brazil
Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are esp... 详细信息
来源: 评论
GonoGo - Assessing the Confidence Level of Distribute intrusion detection systems Alarms Based on BGP
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2025年 第1期22卷 209-219页
作者: Silva, Renato S. de Moraes, Luis M. Felipe Univ Fed Rio de Janeiro BR-21941901 Rio de Janeiro Brazil
Although Border Gateway Protocol - BGP is increasingly becoming a multi-purpose protocol, it suffers from security issues regarding bogus announcements for malicious goals. Some of these security breaches are particul... 详细信息
来源: 评论
Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2018年 第Apr.期108卷 76-86页
作者: Francisco Colom, Jose Gil, David Mora, Higinio Volckaert, Bruno Manuel Jimeno, Antonio Univ Alicante Dept Comp Sci Technol & Computat Alicante Spain Univ Ghent Dept Informat Technol Technol Pk Zwijnaarde 15 B-9052 Ghent Belgium
The evolving trends of mobility, cloud computing and collaboration have blurred the perimeter separating corporate networks from the wider world. These new tools and business models enhance productivity and present ne... 详细信息
来源: 评论
The Application of distributed intrusion detection system in electronic commerce
The Application of Distributed Intrusion Detection System in...
收藏 引用
2010 International Symposium on Computer,Communication, Control and Automation
作者: Weijian Huang School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Yan An School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Guanjun Li Handan Information Office Handan, China Fei Wang School of Economy and Management Hebei University of Engineering Handan, China
With the rapid development of Internet, electronic commerce is being increasingly widely used, while Safety is the primary factor in the rapid development of electronic commerce. distributed intrusion detection system... 详细信息
来源: 评论
High Precision Time Synchronization Scheme for distributed intrusion detection system
High Precision Time Synchronization Scheme for Distributed I...
收藏 引用
The 2010 International Conference on Computer Application and system Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Jian Sun Huihui Ma Du Xu Research Center for Optical Network & Mobile Information Network (COIMIN) School of Communication and Information Engineering (SCIE) University of Electronic Science and Technology of China (UESTC) Chengdu 611731 China
Time synchronization is an important middleware service of distributed systems, amongst which distributed intrusion detection system (DIDS) makes extensive use of time synchronization in particularl. Time synchronizat... 详细信息
来源: 评论