A new approach to intrusion detection system

被引:0
作者
Laboratoire de Recherche en Informatique et Télécommunications, Faculty of Sciences, University of Mohammed V, Rabat, Morocco [1 ]
机构
来源
J. Theor. Appl. Inf. Technol. | / 2卷 / 284-289期
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer crime - Information use - Intrusion detection - Security systems - Information systems - Network security
引用
收藏
相关论文
共 50 条
  • [21] New Shinkansen system
    Rail Int, 1600, 2 (18-34):
  • [22] Mesoscale frontal structures in the Canary Upwelling System: New front and filament detection algorithms applied to spatial and temporal patterns
    Centre de Recherche Halieutique Méditerranéenne et Tropicale, Institut de Recherche Pour le Développement, Rue Jean Monnet, BP 171, 34203 Sete Cedex, France
    不详
    Remote Sens. Environ., (339-346):
  • [23] A NEW APPROACH TO IMAGE REGISTRATION ON A MINICOMPUTER
    SIMPSON, B
    JOURNAL OF APPLIED PHOTOGRAPHIC ENGINEERING, 1982, 8 (01): : 68 - 70
  • [24] A new dynamic bandwidth provisioning approach
    Computer and Electronic Engineering department, University of Sistan and Baluchestan, Zahedan, Iran
    Int. J. Appl. Math. Stat., SUPPL. 11 (43-52):
  • [25] LPRNet: A Novel Approach for Novelty Detection in Networking Packets
    Chauhan, Anshumaan
    Agarwal, Ayushi
    Jothi, Angel Arul
    Vadivel, Sangili
    International Journal of Advanced Computer Science and Applications, 2022, 13 (02): : 107 - 115
  • [26] PhishMatch: A layered approach for effective detection of phishing URLs
    Tupsamudre, Harshal
    Jain, Sparsh
    Lodha, Sachin
    arXiv, 2021,
  • [27] An improved approach of scene change detection in archived films
    Zhang, Xiaona
    Qi, Guoqing
    Wang, Qiang
    Zhang, Tao
    International Conference on Signal Processing Proceedings, ICSP, 2010, : 825 - 828
  • [28] Email Spam Detection using Deep Learning Approach
    Debnath, Kingshuk
    Kar, Nirmalya
    2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing, COM-IT-CON 2022, 2022, : 37 - 41
  • [29] NEW APPROACH TO THE DESIGN OF TERNARY ADDER.
    Anjaneyulu, G.V.
    1600, (18):
  • [30] GPPA: A NEW APPROACH TO PATENT RIGHTS.
    Kraft II, Chas.L.
    Industrial research/development, 1982, 24 (11): : 142 - 145