26   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli    
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici    
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Atheer R. Muhsen,Ghazwh G. Jumaa,Nadia F. AL Bakri,Ahmed T. Sadiq     Pág. pp. 158 - 171
The task of network security is to keep services available at all times by dealing with hacker attacks. One of the mechanisms obtainable is the Intrusion Detection System (IDS) which is used to sense and classify any abnormal actions. Therefore, the IDS ... ver más

 
en línea
Jovana Mijalkovic and Angelo Spognardi    
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of network... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi    
Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Edward Guillen, Jeisson Sánchez and Rafael Paez    
A wide range of IDS implementations with anomaly detection modules have been deployed. In general, those modules depend on intrusion knowledge databases, such as Knowledge Discovery Dataset (KDD99), Center for Applied Internet Data Analysis (CAIDA) or Co... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Derick Blaauw,Anmar Pretorius    
AbstractThe study of subjective well-being is no longer on the periphery of study in the field of economics. A significant body of literature exists on the determinants of subjective well-being in the developed world. This paper uses the first wave of th... ver más
Revista: Journal of Economic and Financial Sciences (JEF)    Formato: Electrónico

 
en línea
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage    
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mustafa Al Lail, Alejandro Garcia and Saul Olivo    
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng    
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, Iram Haider, Rosilah Hassan, Muhammad Reazul Haque, Seleviawati Tarmizi and Joel J. P. C. Rodrigues    
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lumengo Bonga-Bonga, Thabiso Molemohi and Frederich Kirsten    
This paper contributes to the literature on the effects of adverse economic conditions on gender differences in the labour market by assessing how COVID-19, a global trigger for a critical adverse condition, impacted gender differences in the labour mark... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin    
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Talent Zwane, Lorraine Greyling, Mokadi Maleka    
This study employs panel data estimation models to investigate the determinants of household savings in South Africa over the period 2008 ? 2012. The novelty of some panel data models is their power to overcome the problems of endogeneity bias, in additi... ver más

 
en línea
Abdulatif Alabdulatif, Sajjad Hussain Rizvi     Pág. 153 - 164
The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extens... ver más

 
en línea
Mduduzi Biyase, Talent Zwane, September Rooderick    
This paper employs a newly-available and representative National Income Dynamics Study (NIDS) data of South African households to investigate whether social grants crowd-out or displace remittances. The estimated results based on full sample reveal that ... ver más

 
en línea
Hsiao-Chung Lin, Ping Wang and Wen-Hui Lin    
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing ap... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »