咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 28 篇 distributed intr...
  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 3 篇 data security
  • 3 篇 xml
  • 3 篇 big data
  • 3 篇 mobile agent
  • 3 篇 security
  • 2 篇 internet of thin...
  • 2 篇 dids
  • 2 篇 firewalls (compu...
  • 2 篇 online clusterin...
  • 2 篇 smart grids
  • 2 篇 bgp
  • 2 篇 advanced meterin...
  • 2 篇 machine learning
  • 2 篇 intelligent deci...
  • 2 篇 mini-batch k-mea...
  • 2 篇 cloud computing
  • 2 篇 intelligent agen...

机构

  • 1 篇 univ maryland ba...
  • 1 篇 iit dept ctr edu...
  • 1 篇 univ lille 1 lab...
  • 1 篇 masdar inst sci ...
  • 1 篇 sfax univ digita...
  • 1 篇 shandong univ sc...
  • 1 篇 school of inform...
  • 1 篇 n china elect po...
  • 1 篇 department of co...
  • 1 篇 peter great st p...
  • 1 篇 univ fed rio de ...
  • 1 篇 beijing univ pos...
  • 1 篇 wuhan polytechn ...
  • 1 篇 institute center...
  • 1 篇 sch engn & comp ...
  • 1 篇 natl sch elect &...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 univ technol tro...
  • 1 篇 research center ...

作者

  • 2 篇 silva renato s.
  • 1 篇 zhang meixia
  • 1 篇 francisco colom ...
  • 1 篇 lang sd
  • 1 篇 gil david
  • 1 篇 fourati lamia ch...
  • 1 篇 bai yuan
  • 1 篇 bernhard sick
  • 1 篇 suchetana chakra...
  • 1 篇 sukumar nandi
  • 1 篇 sven tomforde
  • 1 篇 de moraes luis f...
  • 1 篇 wang yongkang
  • 1 篇 manuel jimeno an...
  • 1 篇 tafazolli rahim
  • 1 篇 zeyar aung
  • 1 篇 aung zeyar
  • 1 篇 lu xian-liang
  • 1 篇 fadwa abdul aziz...
  • 1 篇 liu wen-tao

语言

  • 26 篇 英文
  • 2 篇 中文
检索条件"主题词=distributed intrusion detection system"
28 条 记 录,以下是21-30 订阅
排序:
Design and Simulation of a Tree-Based intrusion detection system against Denial of Service
Design and Simulation of a Tree-Based Intrusion Detection Sy...
收藏 引用
International Conference on Applied Mechanics and Mechanical Engineering
作者: Bai Yuan Bai Zhong-ying Tianjin Univ Technol Tianjin 300191 Peoples R China Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China
Based on analysis of relative and absolute traffic anomalies a fully DIDS(distributed intrusion detection system) is built to detect and respond flooding DoS(Denial of Service) in a specific network area, using traffi... 详细信息
来源: 评论
An Improved Snort intrusion detection system Based on Self-similar Traffic Model
An Improved Snort Intrusion Detection System Based on Self-s...
收藏 引用
1st International Symposium on Computer Network and Multimedia Technology
作者: Kong Hong Zhang Jiangang Shandong Univ Sci & Technol Coll Econ & Management Qingdao Peoples R China
This paper introduces the existing distributed intrusion detection technology and points out the disadvantages of the traditional intrusion detection system. A distributed intrusion detection system based on self-simi... 详细信息
来源: 评论
A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A distributed IDS
A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A DISTRIBUTED ...
收藏 引用
1st International Conference on Networks and Communications
作者: Chandradeep, K. B. IIT Dept Ctr Educ Technol Kharagpur W Bengal India
This paper proposes a scheme for the design and implementation of a new security architecture for protecting exposed intranets or groups of computers in a network from malicious attacks. The proposed scheme presents a... 详细信息
来源: 评论
Research on intrusion detection rules based on XML in distributed IDS
Research on intrusion detection rules based on XML in distri...
收藏 引用
7th International Conference on Machine Learning and Cybernetics
作者: Liu, Wen-Tao Wuhan Polytechn Univ Dept Comp & Informat Engn Wuhan Hebei 430023 Peoples R China
This paper describes the design and research of intrusion detection rules in the distributed intrusion detection system which is based on agent. The hierarchical framework model based on intelligent agents is proved i... 详细信息
来源: 评论
RESEARCH ON intrusion detection RULES BASED ON XML IN distributed IDS
RESEARCH ON INTRUSION DETECTION RULES BASED ON XML IN DISTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: WEN-TAO LIU Department of Computer and Information Engineering Wuhan Polytechnic University Wuhan Hubei 430023 China
This paper describes the design and research of intrusion detection rules in the distributed intrusion detection system which is based on agent. The hierarchical framework model based on intelligent agents is proved i... 详细信息
来源: 评论
Performance Study of distributed Multi-Agent intrusion detection system
收藏 引用
Computer Aided Drafting,Design and Manufacturing 2005年 第2期15卷 38-43页
作者: YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan School of Information Engineering Wuhan University of Technology Wuhan 430070 China
Traditional intrusion detection system (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... 详细信息
来源: 评论
Weighted link graphs: A distributed IDS for secondary intrusion detection and defense
Weighted link graphs: A distributed IDS for secondary intrus...
收藏 引用
Conference on Data Mining, intrusion detection, Information Assurance and Data Networks Security 2005
作者: Zhou, M Lang, SD Univ Cent Florida Dept Comp Sci Orlando FL 32816 USA
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer&... 详细信息
来源: 评论
Novel distributed ids based by mobile agent
收藏 引用
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China 2005年 第3期34卷 369-372页
作者: Luo, Guang-Chun Yang, Jun-Hui Lu, Xian-Liang Information Centre Univ. of Electron. Sci. and Technol. of China Chengdu 610054 China
This paper presents a new Mobile Agent distributed IDS (MADIDS) system basing on the mobile agents. This system is specifically designed for WAN, In MADIDS, the agents that are set at each node process the data transf... 详细信息
来源: 评论