Evaluation of the diagnostic capabilities of commercial intrusion detection systems

被引:0
作者
France Télécom R and D, 42 rue des Coutures, Caen [1 ]
F-14000, France
机构
来源
Lect. Notes Comput. Sci. | / 177-198期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection - Testing - Malware
引用
收藏
相关论文
共 50 条
[21]   Capabilities of digital servitization: Evidence from the socio-technical systems theory [J].
Münch, Christopher ;
Marx, Emanuel ;
Benz, Lukas ;
Hartmann, Evi ;
Matzner, Martin .
Technological Forecasting and Social Change, 2022, 176
[22]   Intrusion detection system using memtic algorithm supporting with genetic and decision tree algorithms [J].
Dept of IT, Bharath University, Chennai, Tamil Nadu-600073, India ;
不详 ;
不详 .
Int. J. Comput. Sci. Issues, 2 2-3 (508-514)
[23]   Policy-based intrusion detection in web applications by monitoring Java information flows [J].
Hiet, Guillaume ;
Tong, Valérie Viet Triem ;
Mé, Ludovic ;
Morin, Benjamin .
International Journal of Information and Computer Security, 2009, 3 (3-4) :265-279
[24]   An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach [J].
Peng, Junfeng ;
Cai, Ziwei ;
Chen, Zhenyu ;
Liu, Xujiang ;
Zheng, Mianyu ;
Song, Chufeng ;
Zhu, Xiongyong ;
Teng, Yi ;
Zhang, Ruilin ;
Zhou, Yanqin ;
Lv, Xuyang ;
Xu, Jun .
Journal of Information Security and Applications, 2022, 71
[25]   TTIDS : A Time-Driven Trust Based Intrusion Detection System for IoT Networks [J].
Choukhairi, Mouad ;
Fakhri, Youssef ;
Amnai, Mohamed .
Proceedings - 2022 9th International Conference on Wireless Networks and Mobile Communications, WINCOM 2022, 2022,
[26]   Research and simulation on the fast incremental SVM intrusion detection algorithm based on adjacent boundary area [J].
School of Electronic and Computer Science and Technology, North University of China, Taiyuan Shanxi 030051, China .
Int. J. Digit. Content Technol. Appl., 22 (262-269)
[27]   Optimal Multipath Planning for intrusion detection in smart homes using Wireless Sensor and Actor Networks [J].
Lai, Yung-Liang ;
Jiang, Jehn-Ruey .
Proceedings of the International Conference on Parallel Processing Workshops, 2010, :562-570
[28]   DIAGNOSTIC-ANALYSIS OF INVENTORY SYSTEMS - AN OPTIMIZATION APPROACH [J].
BITRAN, GR ;
HAX, AC ;
VALORSABATIER, J .
NAVAL RESEARCH LOGISTICS, 1982, 29 (01) :29-46
[29]   A Study on Self-Configuring Intrusion Detection Model based on Hybridized Deep Learning Models [J].
Computer Department, Thadomal Sahani Engineering College, Bandra West, Maharashtra, Mumbai ;
400050, India .
Proc. - Int. Conf. Comput. Methodol. Commun., ICCMC, (303-309)
[30]   Anomaly-Based Intrusion Detection System for In-Flight and Network Security in UAV Swarm [J].
Da Silva, Leandro Marcos ;
Ferrao, Isadora Garcia ;
Dezan, Catherine ;
Espes, David ;
Branco, Kalinka R. L. J. C. .
2023 International Conference on Unmanned Aircraft Systems, ICUAS 2023, 2023, :812-819