Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3by Shahid, Anwar, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Inayat, Zakira, Khan, Suleman, Anthony, Bokolo Jnr., Chang, Victor“… attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs…”
Published 2017
Get full text
Get full text
Get full text
Get full text
-
4“… intrusion detection and prevention techniques are considered, wired networks appear to be in a much better…”
Get full text
Get full text
Get full text
-
5Published 2014“… task could be performed for breaching security of the system. To tackle intrusion of various kinds, we…”
Get full text
Get full text
Get full text
Get full text
-
6“…Generally one dimensional (1-D) empirical salinity intrusion model is limited to natural alluvial…”
Get full text
Get full text
Get full text
Get full text
-
7
-
8by Abduvaliyev, Abror, Pathan, Al-Sakib Khan, Zhou, Jianying, Roman, Rodrigo, Wong, Wai-Choong“…, such as Intrusion Detection Systems (IDSs), where correctness and energy efficiency are of vital importance…”
Published 2013
Get full text
Get full text
Get full text
-
9by Gisen, J. I. A., Siti Syuhaida, Adnan, Ahmad Amirul Faiz, Ahmad Tajudin, Tian, Xian Chan“…Awareness on salt intrusion problem is still lacking in Malaysia due to high precipitation…”
Published 2018
Get full text
Get full text
Get full text
-
10by Zakira, Inayat, Abdullah, Gani, Nor Badrul, Anuar, Muhammad Khuram, Khan, Shahid, Anwar“… intrusion detection system and a real-time intrusion response system are required. In this paper, we present…”
Published 2016
Get full text
Get full text
Get full text
-
11“… due to the threat of intrusions and misuse. Unfortunately, none of the existing systems have proved…”
Get full text
Get full text
Get full text
Get full text
-
12“… feature space like in Intrusion Detection System (IDS) data. Rough set is widely used in IDS to overcome…”
Get full text
Get full text
Get full text
Get full text
-
13by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat“…In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network…”
Published 2018
Get full text
Get full text
Get full text
Get full text
-
14by Ahmad, Azuan, Kama, Mohd Nazri, Zainudin, Wan Shafiuddin, Idris, Norbik Bashah, Mohd Saudi, Madihah, Zakaria, Nur Hafiza“… mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From…”
Published 2018
Get full text
Get full text
Get full text
-
15by Shahid, Anwar, Mohamad Fadli, Zolkipli, Aws Naser, Jaber, Jasni, Mohamad Zain, Zakira, Inayat, Odili, Julius Beneoluchi“… attracted a lot of research in the field of intrusion detection and response system to reduce the effect…”
Published 2015
Get full text
Get full text
Get full text
Get full text
-
16“…For one-dimensional salt intrusion models to be predictive, we need predictive equations to link…”
Get full text
Get full text
Get full text
-
17by Abduvaliyev, Abror, Pathan, Al-Sakib Khan, Jianying, Zhou, Roman, Rodrigo, Wai-Choong, Wong“…This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs…”
Published 2012
Get full text
Get full text
Get full text
-
18“… to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs…”
Get full text
Get full text
Get full text
-
19“…A non-intrusive design for monitoring everyday activities of an elderly person is presented…”
Get full text
Get full text
Get full text
Get full text
Get full text
-
20“…An extensive review of the intrusion detection system (IDS) is presented in this paper. Previous…”
Get full text
Get full text
Get full text
Get full text