咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 28 篇 distributed intr...
  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 3 篇 data security
  • 3 篇 xml
  • 3 篇 big data
  • 3 篇 mobile agent
  • 3 篇 security
  • 2 篇 internet of thin...
  • 2 篇 dids
  • 2 篇 firewalls (compu...
  • 2 篇 online clusterin...
  • 2 篇 smart grids
  • 2 篇 bgp
  • 2 篇 advanced meterin...
  • 2 篇 machine learning
  • 2 篇 intelligent deci...
  • 2 篇 mini-batch k-mea...
  • 2 篇 cloud computing
  • 2 篇 intelligent agen...

机构

  • 1 篇 univ maryland ba...
  • 1 篇 iit dept ctr edu...
  • 1 篇 univ lille 1 lab...
  • 1 篇 masdar inst sci ...
  • 1 篇 sfax univ digita...
  • 1 篇 shandong univ sc...
  • 1 篇 school of inform...
  • 1 篇 n china elect po...
  • 1 篇 department of co...
  • 1 篇 peter great st p...
  • 1 篇 univ fed rio de ...
  • 1 篇 beijing univ pos...
  • 1 篇 wuhan polytechn ...
  • 1 篇 institute center...
  • 1 篇 sch engn & comp ...
  • 1 篇 natl sch elect &...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 univ technol tro...
  • 1 篇 research center ...

作者

  • 2 篇 silva renato s.
  • 1 篇 zhang meixia
  • 1 篇 francisco colom ...
  • 1 篇 lang sd
  • 1 篇 gil david
  • 1 篇 fourati lamia ch...
  • 1 篇 bai yuan
  • 1 篇 bernhard sick
  • 1 篇 suchetana chakra...
  • 1 篇 sukumar nandi
  • 1 篇 sven tomforde
  • 1 篇 de moraes luis f...
  • 1 篇 wang yongkang
  • 1 篇 manuel jimeno an...
  • 1 篇 tafazolli rahim
  • 1 篇 zeyar aung
  • 1 篇 aung zeyar
  • 1 篇 lu xian-liang
  • 1 篇 fadwa abdul aziz...
  • 1 篇 liu wen-tao

语言

  • 26 篇 英文
  • 2 篇 中文
检索条件"主题词=distributed intrusion detection system"
28 条 记 录,以下是21-30 订阅
排序:
A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A distributed IDS
A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A DISTRIBUTED ...
收藏 引用
1st International Conference on Networks and Communications
作者: Chandradeep, K. B. IIT Dept Ctr Educ Technol Kharagpur W Bengal India
This paper proposes a scheme for the design and implementation of a new security architecture for protecting exposed intranets or groups of computers in a network from malicious attacks. The proposed scheme presents a... 详细信息
来源: 评论
DISCUS: A massively distributed IDS architecture using a DSL-based configuration
DISCUS: A massively distributed IDS architecture using a DSL...
收藏 引用
International Conference on Information Science, Electronics and Electrical Engineering (ISEEE)
作者: Riquet, Damien Grimaud, Gilles Hauspie, Michael Univ Lille 1 Lab Informat Fondamentale Lille F-59650 Villeneuve Dascq France
Nowadays, cloud computing becomes quite popular and a lot of research is done on services it provides. Most of security challenges induced by this new architecture are not yet tackled. In this work, we propose a new s... 详细信息
来源: 评论
Research on intrusion detection rules based on XML in distributed IDS
Research on intrusion detection rules based on XML in distri...
收藏 引用
7th International Conference on Machine Learning and Cybernetics
作者: Liu, Wen-Tao Wuhan Polytechn Univ Dept Comp & Informat Engn Wuhan Hebei 430023 Peoples R China
This paper describes the design and research of intrusion detection rules in the distributed intrusion detection system which is based on agent. The hierarchical framework model based on intelligent agents is proved i... 详细信息
来源: 评论
Real-Time Anomaly-Based distributed intrusion detection systems for Advanced Metering Infrastructure Utilizing Stream Data Mining
Real-Time Anomaly-Based Distributed Intrusion Detection Syst...
收藏 引用
International Conference on Smart Grid and Clean Energy Technologies
作者: Fadwa Abdul Aziz Alseiari Zeyar Aung Institute Center for Smart and Sustainable Systems (iSmart) Masdar Institute of Science and Technology
The advanced Metering Infrastructure (AMI) is one of the core components of smart grids' architecture. As AMI components are connected through mesh networks in a distributed mechanism, new vulnerabilities will be ... 详细信息
来源: 评论
A Concept for Intelligent Collaborative Network intrusion detection
A Concept for Intelligent Collaborative Network Intrusion De...
收藏 引用
ARCS 2017;30th International Conference on Architecture of Computing systems
作者: Christian Gruhl Frank Beer Henner Heck Bernhard Sick Ulrich Buehler Arno Wacker Sven Tomforde University of Kassel University of Applied Sciences Fulda
With the rise of modern smartphones and the Internet of Things providing considerable computing power, the Internet is changing towards a bigger, more dynamic, and organic environment. However, not all changes are ben... 详细信息
来源: 评论
Exploit detection Techniques for STP using distributed IDS
Exploit Detection Techniques for STP using Distributed IDS
收藏 引用
World Congress on Information and Communication Technologies
作者: Ankush Rai Ferdous A. Barbhuiya Arijit Sur Santosh Biswas Suchetana Chakraborty Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology Guwahati
Spanning tree protocol (STP) is a link layer protocol used for link management, prevention of loop formation etc. in the network. Although STP is widely used, it is still prone to many kinds of attacks that exploit th... 详细信息
来源: 评论
RESEARCH ON intrusion detection RULES BASED ON XML IN distributed IDS
RESEARCH ON INTRUSION DETECTION RULES BASED ON XML IN DISTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: WEN-TAO LIU Department of Computer and Information Engineering Wuhan Polytechnic University Wuhan Hubei 430023 China
This paper describes the design and research of intrusion detection rules in the distributed intrusion detection system which is based on agent. The hierarchical framework model based on intelligent agents is proved i... 详细信息
来源: 评论
Novel distributed ids based by mobile agent
收藏 引用
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China 2005年 第3期34卷 369-372页
作者: Luo, Guang-Chun Yang, Jun-Hui Lu, Xian-Liang Information Centre Univ. of Electron. Sci. and Technol. of China Chengdu 610054 China
This paper presents a new Mobile Agent distributed IDS (MADIDS) system basing on the mobile agents. This system is specifically designed for WAN, In MADIDS, the agents that are set at each node process the data transf... 详细信息
来源: 评论