Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Intrusion detection system
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Further reading == *{{cite book|last1=Bace|first1=Rebecca Gurley|title=Intrusion Detection|date=2000|publisher=Macmillan Technical|location=Indianapolis, IN|isbn=978-1578701858|url=https://archive.org/details/intrusiondetecti00rebe}} *{{cite web |url = http://www.softpanorama.org/Articles/architectural_issues_of_intrusion_detection_infrastructure.shtml |title = Architectural Issues of Intrusion Detection Infrastructure in Large Enterprises (Revision 0.82) |publisher = Softpanorama |first = Nikolai |last = Bezroukov |date = 11 December 2008 |access-date = 30 July 2010 }} *{{cite journal |author = P.M. Mafra and J.S. Fraga and A.O. Santin |title = Algorithms for a distributed IDS in MANETs |journal = Journal of Computer and System Sciences |volume = 80 |number = 3 |pages = 554β570 |year = 2014 |doi=10.1016/j.jcss.2013.06.011 |doi-access = free }} * {{cite journal | last1 = Hansen | first1 = James V. | last2 = Benjamin Lowry | first2 = Paul | last3 = Meservy | first3 = Rayman | last4 = McDonald | first4 = Dan | year = 2007 | title = Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection | ssrn = 877981 | journal = Decision Support Systems | volume = 43 | issue = 4| pages = 1362β1374 | doi = 10.1016/j.dss.2006.04.004 }} *{{cite journal |url = http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf |title = Guide to Intrusion Detection and Prevention Systems (IDPS) |first1 = Karen |last1 = Scarfone |first2 = Peter |last2 = Mell |journal = Computer Security Resource Center |issue = 800β94 |access-date = 1 January 2010 |date = February 2007 |archive-url = https://web.archive.org/web/20100601171625/http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf |archive-date = 1 June 2010 |url-status = dead }} *{{cite web |title = Evasions In Intrusion Prevention Detection Systems |url = http://www.virusbtn.com/virusbulletin/archive/2010/04/vb201004-evasions-in-IPS-IDS |publisher = Virus Bulletin |first1 = Abhishek |last1 = Singh |access-date = 1 April 2010 }} *{{cite web |title = Implementation of Network Intrusion Detection System using Deep Learning |url = https://medium.com/geekculture/network-intrusion-detection-using-deep-learning-bcc91e9b999d?source=friends_link&sk=2b84dd61f3e76d63af0a14daf6f89f43 |publisher = Medium |first1 = Abhinav |last1 = Dubey |access-date = 17 April 2021 }} * Al_Ibaisi, T., Abu-Dalhoum, A. E.-L., Al-Rawi, M., Alfonseca, M., & Ortega, A. (n.d.). Network Intrusion Detection Using Genetic Algorithm to find Best DNA Signature. http://www.wseas.us/e-library/transactions/systems/2008/27-535.pdf * Ibaisi, T. A., Kuhn, S., Kaiiali, M., & Kazim, M. (2023). Network Intrusion Detection Based on Amino Acid Sequence Structure Using Machine Learning. Electronics, 12(20), 4294. https://doi.org/10.3390/electronics12204294
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)