An Overview of Intrusion Detection System Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Stephant Naorem, Abhishek Sharma Subject(s): Engineering, Applied Linguistics
Application of neural networks in identification of measurement anomaly detection Journal title: International Research Journal of Applied and Basic Sciences Authors: Morteza salari akhgar| Department of computer, Ghorveh Branch, Islamic Azad University, GHorveh, Ira... Subject(s): Public Health and Community Medicine
A Network Attack Classification for Multi Agent System Using Flow Based Intusion Detection System Journal title: The International Journal of Technological Exploration and Learning Authors: K.A.VarunKumar| Department of Computer Science and Engineering Vel Tech Dr.RR & Dr.SR Technical Univ... Subject(s): Engineering, Educational Technology
Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm Journal title: The International Journal of Technological Exploration and Learning Authors: Jothi Lakshmi U| Assistant Professor, Department of Information Technology, PITAM,Chennai,India Subject(s): Engineering, Educational Technology
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice Journal title: International Journal of Science Engineering and Advance Technology Authors: K.Suganya| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineerin... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Finest Informant Filtering of Malicious Traffic in Intrusion Detection System Journal title: International Journal of Science Engineering and Advance Technology Authors: Palli Rama Krishna| M.Tech In Computer Science & Engineering , KIET, K Ravi Kumar| HOD & Assoct. Pro... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Significant Cumulative Cryptosystem for Accessible Data Distribution in Cloud Storage Journal title: International Journal of Science Engineering and Advance Technology Authors: S.Jhansi| Student of M.Tech (CSE) and Department of Computer Science Engineering, Vignan’s Institute... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks Journal title: International Journal of Science Engineering and Advance Technology Authors: K.Ramya Sree| M.tech(CSE),Dept. of CSE, Sr.Asst Professor, Dept of CSE S.R.K Institute of Technology... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
The Competent Service Management and Reliable Trustworthiness in Cloud Environment Journal title: International Journal of Science Engineering and Advance Technology Authors: Kilari Prasanna| M.Tech Scholar (CSE), Department of Computer Science &Engineering, Dasari Ravi Kuma... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach Journal title: International Journal of Science Engineering and Advance Technology Authors: B.S.R.D. Lakshmi| M.Tech Scholar (CSE), Department of Computer Science & Engineering, K. L. Ganapath... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
slugAnalysis of Artificial Neural Networks Based Intrusion Detection Systems for Mobile Ad Hoc Networks Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Alka Chaudhary, V.N.Tiwari, Anil Kumar Subject(s): Engineering, Applied Linguistics
slugAn Advanced Hybrid Intrusion Detection System in Cloud Computing Environment Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Vikas Singh, Amit Kumar, Astt. Prof. Devender Kumar Subject(s): Engineering, Applied Linguistics
slugMaintaining Data Security In Privacy Preserving Association Rule Mining Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Adesh chaudhary, Krishna Pratap Rao, Prashant Johri Subject(s): Engineering, Applied Linguistics
Cooperative clustering based Secure Leader Election Model For Intrusion Detection in MANET Journal title: International Journal of Management, IT and Engineering Authors: R.Jasmin Reeda and A.Ananthakumari Subject(s): Computer and Information Science, Engineering, Management Science, Development Studies
Database Intrusion Detection Using Role Based Access Control System Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Mrs. Antony Vigil, Mrinalini Shridhar, R Oviya Subject(s): Engineering, Applied Linguistics