咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 28 篇 distributed intr...
  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 3 篇 data security
  • 3 篇 xml
  • 3 篇 big data
  • 3 篇 mobile agent
  • 3 篇 security
  • 2 篇 internet of thin...
  • 2 篇 dids
  • 2 篇 firewalls (compu...
  • 2 篇 online clusterin...
  • 2 篇 smart grids
  • 2 篇 bgp
  • 2 篇 advanced meterin...
  • 2 篇 machine learning
  • 2 篇 intelligent deci...
  • 2 篇 mini-batch k-mea...
  • 2 篇 cloud computing
  • 2 篇 intelligent agen...

机构

  • 1 篇 univ maryland ba...
  • 1 篇 iit dept ctr edu...
  • 1 篇 univ lille 1 lab...
  • 1 篇 masdar inst sci ...
  • 1 篇 sfax univ digita...
  • 1 篇 shandong univ sc...
  • 1 篇 school of inform...
  • 1 篇 n china elect po...
  • 1 篇 department of co...
  • 1 篇 peter great st p...
  • 1 篇 univ fed rio de ...
  • 1 篇 beijing univ pos...
  • 1 篇 wuhan polytechn ...
  • 1 篇 institute center...
  • 1 篇 sch engn & comp ...
  • 1 篇 natl sch elect &...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 univ technol tro...
  • 1 篇 research center ...

作者

  • 2 篇 silva renato s.
  • 1 篇 zhang meixia
  • 1 篇 francisco colom ...
  • 1 篇 lang sd
  • 1 篇 gil david
  • 1 篇 fourati lamia ch...
  • 1 篇 bai yuan
  • 1 篇 bernhard sick
  • 1 篇 suchetana chakra...
  • 1 篇 sukumar nandi
  • 1 篇 sven tomforde
  • 1 篇 de moraes luis f...
  • 1 篇 wang yongkang
  • 1 篇 manuel jimeno an...
  • 1 篇 tafazolli rahim
  • 1 篇 zeyar aung
  • 1 篇 aung zeyar
  • 1 篇 lu xian-liang
  • 1 篇 fadwa abdul aziz...
  • 1 篇 liu wen-tao

语言

  • 26 篇 英文
  • 2 篇 中文
检索条件"主题词=distributed intrusion detection system"
28 条 记 录,以下是11-20 订阅
排序:
High Precision Time Synchronization Scheme for distributed intrusion detection system
High Precision Time Synchronization Scheme for Distributed I...
收藏 引用
The 2010 International Conference on Computer Application and system Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Jian Sun Huihui Ma Du Xu Research Center for Optical Network & Mobile Information Network (COIMIN) School of Communication and Information Engineering (SCIE) University of Electronic Science and Technology of China (UESTC) Chengdu 611731 China
Time synchronization is an important middleware service of distributed systems, amongst which distributed intrusion detection system (DIDS) makes extensive use of time synchronization in particularl. Time synchronizat... 详细信息
来源: 评论
About distributed intrusion detection system's Research
About Distributed Intrusion Detection System's Research
收藏 引用
2010 International Symposium on Computer,Communication, Control and Automation
作者: Weijian Huang School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Yan An School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Guanjun Li Handan Information Office Handan, China Fei Wang School of Economy and Management Hebei University of Engineering Handan, China
With the risk factor of network security continuously improving, firewalls, which once as a means of the most important safety precautions, can no longer satisfy people's demand for network security. As a compleme... 详细信息
来源: 评论
Performance Study of distributed Multi-Agent intrusion detection system
收藏 引用
Computer Aided Drafting,Design and Manufacturing 2005年 第2期15卷 38-43页
作者: YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan School of Information Engineering Wuhan University of Technology Wuhan 430070 China
Traditional intrusion detection system (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... 详细信息
来源: 评论
GonoGo - Assessing the Confidence Level of Distribute intrusion detection systems Alarms Based on BGP
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2025年 第1期22卷 209-219页
作者: Silva, Renato S. de Moraes, Luis M. Felipe Univ Fed Rio de Janeiro BR-21941901 Rio de Janeiro Brazil
Although Border Gateway Protocol - BGP is increasingly becoming a multi-purpose protocol, it suffers from security issues regarding bogus announcements for malicious goals. Some of these security breaches are particul... 详细信息
来源: 评论
Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2018年 第Apr.期108卷 76-86页
作者: Francisco Colom, Jose Gil, David Mora, Higinio Volckaert, Bruno Manuel Jimeno, Antonio Univ Alicante Dept Comp Sci Technol & Computat Alicante Spain Univ Ghent Dept Informat Technol Technol Pk Zwijnaarde 15 B-9052 Ghent Belgium
The evolving trends of mobility, cloud computing and collaboration have blurred the perimeter separating corporate networks from the wider world. These new tools and business models enhance productivity and present ne... 详细信息
来源: 评论
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2024年 第11-12期79卷 901-912页
作者: Silva, Renato S. de Assis, Felipe M. F. Macedo, Evandro L. C. de Moraes, Luis Felipe M. Univ Fed Rio De Janeiro High Speed Networks Lab PESC COPPE Ave Horacio Macedo2030 Cidade Univ BR-21941914 Rio De Janeiro RJ Brazil
Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are esp... 详细信息
来源: 评论
Real-Time Anomaly-Based distributed intrusion detection systems for Advanced Metering Infrastructure Utilizing Stream Data Mining  5
Real-Time Anomaly-Based Distributed Intrusion Detection Syst...
收藏 引用
International Conference on Smart Grid and Clean Energy Technologies (ICSGCE 2015)
作者: Alseiari, Fadwa Abdul Aziz Aung, Zeyar Masdar Inst Sci & Technol Inst Ctr Smart & Sustainable Syst iSmart Abu Dhabi U Arab Emirates
The advanced Metering Infrastructure (AMI) is one of the core components of smart grids' architecture. As AMI components are connected through mesh networks in a distributed mechanism, new vulnerabilities will be ... 详细信息
来源: 评论
Weighted link graphs: A distributed IDS for secondary intrusion detection and defense
Weighted link graphs: A distributed IDS for secondary intrus...
收藏 引用
Conference on Data Mining, intrusion detection, Information Assurance and Data Networks Security 2005
作者: Zhou, M Lang, SD Univ Cent Florida Dept Comp Sci Orlando FL 32816 USA
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer&... 详细信息
来源: 评论
An Improved Snort intrusion detection system Based on Self-similar Traffic Model
An Improved Snort Intrusion Detection System Based on Self-s...
收藏 引用
1st International Symposium on Computer Network and Multimedia Technology
作者: Kong Hong Zhang Jiangang Shandong Univ Sci & Technol Coll Econ & Management Qingdao Peoples R China
This paper introduces the existing distributed intrusion detection technology and points out the disadvantages of the traditional intrusion detection system. A distributed intrusion detection system based on self-simi... 详细信息
来源: 评论
Design and Simulation of a Tree-Based intrusion detection system against Denial of Service
Design and Simulation of a Tree-Based Intrusion Detection Sy...
收藏 引用
International Conference on Applied Mechanics and Mechanical Engineering
作者: Bai Yuan Bai Zhong-ying Tianjin Univ Technol Tianjin 300191 Peoples R China Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China
Based on analysis of relative and absolute traffic anomalies a fully DIDS(distributed intrusion detection system) is built to detect and respond flooding DoS(Denial of Service) in a specific network area, using traffi... 详细信息
来源: 评论