UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 161
1.
  • Design and implementation o... Design and implementation of an intrusion detection system by using Extended BPF in the Linux kernel
    Wang, Shie-Yuan; Chang, Jen-Chieh Journal of network and computer applications, February 2022, 2022-02-00, Letnik: 198
    Journal Article
    Recenzirano

    An intrusion detection system (IDS) checks the content of headers and payload of packets to detect intrusions from the network. It is an essential function for network security. Traditionally, an ...
Celotno besedilo
2.
  • Performance comparison of i... Performance comparison of intrusion detection systems and application of machine learning to Snort system
    Shah, Syed Ali Raza; Issac, Biju Future generation computer systems, March 2018, 2018-03-00, Letnik: 80
    Journal Article
    Recenzirano
    Odprti dostop

    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and ...
Celotno besedilo

PDF
3.
Celotno besedilo
4.
  • Implementation of intrusion... Implementation of intrusion prevention system (IPS) to analysis triad cia on network security attacks on web server
    Anggraeni, Amilia; Ginting, Jafaruddin Gusti Amri; Ikhwan, Syariful Jurnal infotel (Online), 11/2022, Letnik: 14, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and ...
Celotno besedilo
5.
Celotno besedilo
6.
  • Snort ids system visualizat... Snort ids system visualization interface for alert analysis
    Gavrilovic, Nadja; Ciric, Vladimir; Lozo, Nikola Serbian journal of electrical engineering, 01/2022, Letnik: 19, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Over the past decades, the rapid Internet development and the growth in the number of its users have raised various security issues. Therefore, it is of great importance to ensure the security of the ...
Celotno besedilo
7.
  • Dynamic Fuzzy Rule Interpol... Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection
    Naik, Nitin; Diao, Ren; Shen, Qiang IEEE transactions on fuzzy systems, 2018-Aug., 2018-8-00, 20180801, Letnik: 26, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Fuzzy rule interpolation (FRI) offers an effective approach for making inference possible in sparse rule-based systems (and also for reducing the complexity of fuzzy models). However, requirements of ...
Celotno besedilo

PDF
8.
  • The Analysis of Web Server ... The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network
    Guterres, Lilia Ervina Jeronimo; Ashari, Ahmad IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 01/2020, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to ...
Celotno besedilo

PDF
9.
  • EKnad: Exploit Kits’ networ... EKnad: Exploit Kits’ network activity detection
    Bountakas, Panagiotis; Ntantogian, Christoforos; Xenakis, Christos Future generation computer systems, September 2022, 2022-09-00, Letnik: 134
    Journal Article
    Recenzirano
    Odprti dostop

    Web Exploit Kits (EKs) are designed to exploit browsers and browsers plugins vulnerabilities, in order to serve malware without drawing user’s attention. Despite their longevity, EKs have adapted ...
Celotno besedilo
10.
  • Model-Based Feature Selecti... Model-Based Feature Selection for Developing Network Attack Detection and Alerting System
    Prihantono, Yuri; Kalamullah Ramli Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 04/2022, Letnik: 6, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The use of the Intrusion Detection Systems (IDS) still has unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine ...
Celotno besedilo
1 2 3 4 5
zadetkov: 161

Nalaganje filtrov