咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 28 篇 distributed intr...
  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 3 篇 data security
  • 3 篇 xml
  • 3 篇 big data
  • 3 篇 mobile agent
  • 3 篇 security
  • 2 篇 internet of thin...
  • 2 篇 dids
  • 2 篇 firewalls (compu...
  • 2 篇 online clusterin...
  • 2 篇 smart grids
  • 2 篇 bgp
  • 2 篇 advanced meterin...
  • 2 篇 machine learning
  • 2 篇 intelligent deci...
  • 2 篇 mini-batch k-mea...
  • 2 篇 cloud computing
  • 2 篇 intelligent agen...

机构

  • 1 篇 univ maryland ba...
  • 1 篇 iit dept ctr edu...
  • 1 篇 univ lille 1 lab...
  • 1 篇 masdar inst sci ...
  • 1 篇 sfax univ digita...
  • 1 篇 shandong univ sc...
  • 1 篇 school of inform...
  • 1 篇 n china elect po...
  • 1 篇 department of co...
  • 1 篇 peter great st p...
  • 1 篇 univ fed rio de ...
  • 1 篇 beijing univ pos...
  • 1 篇 wuhan polytechn ...
  • 1 篇 institute center...
  • 1 篇 sch engn & comp ...
  • 1 篇 natl sch elect &...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 univ technol tro...
  • 1 篇 research center ...

作者

  • 2 篇 silva renato s.
  • 1 篇 zhang meixia
  • 1 篇 francisco colom ...
  • 1 篇 lang sd
  • 1 篇 gil david
  • 1 篇 fourati lamia ch...
  • 1 篇 bai yuan
  • 1 篇 bernhard sick
  • 1 篇 suchetana chakra...
  • 1 篇 sukumar nandi
  • 1 篇 sven tomforde
  • 1 篇 de moraes luis f...
  • 1 篇 wang yongkang
  • 1 篇 manuel jimeno an...
  • 1 篇 tafazolli rahim
  • 1 篇 zeyar aung
  • 1 篇 aung zeyar
  • 1 篇 lu xian-liang
  • 1 篇 fadwa abdul aziz...
  • 1 篇 liu wen-tao

语言

  • 26 篇 英文
  • 2 篇 中文
检索条件"主题词=distributed intrusion detection system"
28 条 记 录,以下是11-20 订阅
排序:
A Concept for Intelligent Collaborative Network intrusion detection
A Concept for Intelligent Collaborative Network Intrusion De...
收藏 引用
ARCS 2017;30th International Conference on Architecture of Computing systems
作者: Christian Gruhl Frank Beer Henner Heck Bernhard Sick Ulrich Buehler Arno Wacker Sven Tomforde University of Kassel University of Applied Sciences Fulda
With the rise of modern smartphones and the Internet of Things providing considerable computing power, the Internet is changing towards a bigger, more dynamic, and organic environment. However, not all changes are ben... 详细信息
来源: 评论
About distributed intrusion detection system's Research
About Distributed Intrusion Detection System's Research
收藏 引用
2010 International Symposium on Computer,Communication, Control and Automation
作者: Weijian Huang School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Yan An School of Information Science and Electrical Engineering Hebei University of Engineering Handan, China Guanjun Li Handan Information Office Handan, China Fei Wang School of Economy and Management Hebei University of Engineering Handan, China
With the risk factor of network security continuously improving, firewalls, which once as a means of the most important safety precautions, can no longer satisfy people's demand for network security. As a compleme... 详细信息
来源: 评论
Real-Time Anomaly-Based distributed intrusion detection systems for Advanced Metering Infrastructure Utilizing Stream Data Mining  5
Real-Time Anomaly-Based Distributed Intrusion Detection Syst...
收藏 引用
International Conference on Smart Grid and Clean Energy Technologies (ICSGCE 2015)
作者: Alseiari, Fadwa Abdul Aziz Aung, Zeyar Masdar Inst Sci & Technol Inst Ctr Smart & Sustainable Syst iSmart Abu Dhabi U Arab Emirates
The advanced Metering Infrastructure (AMI) is one of the core components of smart grids' architecture. As AMI components are connected through mesh networks in a distributed mechanism, new vulnerabilities will be ... 详细信息
来源: 评论
Research of distributed intrusion detection system Model Based on Mobile Agent
Research of Distributed Intrusion Detection System Model Bas...
收藏 引用
International Forum on Information Technology and Applications (IFITA 2009)
作者: Liu Jianxiao Li Lijuan Hunan Univ Dept Comp & Commun Applicat Changsha 410082 Hunan Peoples R China
Itrusion detection has become an important approach to solve the security problems. On the basis of analyzing the defects of the modern intrusion detection system and migrating with the technology of mobile agent, thi... 详细信息
来源: 评论
Study and Implementation of distributed intrusion detection system Based on Anycast Service
Study and Implementation of Distributed Intrusion Detection ...
收藏 引用
5th International Conference on Wireless Communications, Networking and Mobile Computing
作者: Wang Xiaonan Sch Engn & Comp Sci Changshu Inst Technol Changshu Peoples R China
An yeast is a new characteristic of Ipv6 and it has played an important role in many application fields. Therefore, in order to ensure that Anycast service can be performed in security and develop healthily this paper... 详细信息
来源: 评论
Real-Time Anomaly-Based distributed intrusion detection systems for Advanced Metering Infrastructure Utilizing Stream Data Mining
Real-Time Anomaly-Based Distributed Intrusion Detection Syst...
收藏 引用
International Conference on Smart Grid and Clean Energy Technologies
作者: Fadwa Abdul Aziz Alseiari Zeyar Aung Institute Center for Smart and Sustainable Systems (iSmart) Masdar Institute of Science and Technology
The advanced Metering Infrastructure (AMI) is one of the core components of smart grids' architecture. As AMI components are connected through mesh networks in a distributed mechanism, new vulnerabilities will be ... 详细信息
来源: 评论
DISCUS: A massively distributed IDS architecture using a DSL-based configuration
DISCUS: A massively distributed IDS architecture using a DSL...
收藏 引用
International Conference on Information Science, Electronics and Electrical Engineering (ISEEE)
作者: Riquet, Damien Grimaud, Gilles Hauspie, Michael Univ Lille 1 Lab Informat Fondamentale Lille F-59650 Villeneuve Dascq France
Nowadays, cloud computing becomes quite popular and a lot of research is done on services it provides. Most of security challenges induced by this new architecture are not yet tackled. In this work, we propose a new s... 详细信息
来源: 评论
Research on distributed intrusion detection system based on mobile agent
Research on distributed intrusion detection system based on ...
收藏 引用
7th International Conference on Machine Learning and Cybernetics
作者: Cao, Jin-Gang Zheng, Gu-Ping N China Elect Power Univ Dept Comp Baoding Hebei 071003 Peoples R China
The research on distributed intrusion detection system (DIDS) is a rapidly growing area of interest because the existence of centralized intrusion detection system (IDS) is increasingly unfit for the current network c... 详细信息
来源: 评论
RESEARCH ON distributed intrusion detection system BASED ON MOBILE AGENT
RESEARCH ON DISTRIBUTED INTRUSION DETECTION SYSTEM BASED ON ...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: JIN-GANG CAO GU-PING ZHENG Department of Computer North China Electric Power University Baoding Hebei 071003 China
The research on distributed intrusion detection system (DIDS) is a rapidly growing area of interest because the existence of centralized intrusion detection system (IDS) is increasingly unfit for the current network c... 详细信息
来源: 评论
Exploit detection Techniques for STP using distributed IDS
Exploit Detection Techniques for STP using Distributed IDS
收藏 引用
World Congress on Information and Communication Technologies
作者: Ankush Rai Ferdous A. Barbhuiya Arijit Sur Santosh Biswas Suchetana Chakraborty Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology Guwahati
Spanning tree protocol (STP) is a link layer protocol used for link management, prevention of loop formation etc. in the network. Although STP is widely used, it is still prone to many kinds of attacks that exploit th... 详细信息
来源: 评论