Beigh et al., 2013 - Google Patents
Intrusion detection and prevention system: issues and challengesBeigh et al., 2013
View PDF- Document ID
- 11452550346627547711
- Author
- Beigh B
- Bashir U
- Chahcoo M
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
In In spite of the tremendous growth of technologies in computer networking and information technology, still we lack in preventing our resources from theft/attacks. This problem is very big as far as industry/companies are concerned. As maximum of the organizations are facing …
- 238000001514 detection method 0 title abstract description 79
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agarwal et al. | A closer look at intrusion detection system for web applications | |
US20120084866A1 (en) | Methods, systems, and media for measuring computer security | |
Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Bishop et al. | The threat from the net [Internet security] | |
Adeleke | Intrusion detection: issues, problems and solutions | |
Gao et al. | Research on the main threat and prevention technology of computer network security | |
Ye et al. | A system-fault-risk framework for cyber attack classification | |
Buchanan | Introduction to security and network forensics | |
EP1378813A2 (en) | Security policy enforcement systems | |
Asmawi et al. | System architecture for SQL injection and insider misuse detection system for DBMS | |
Navin et al. | A survey on intrusion detection system | |
Kishore et al. | Intrusion detection system a need | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions | |
Irwin | Double-edged sword: dual-purpose cyber security methods | |
Guelzim et al. | Formal methods of attack modeling and detection | |
Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
Cornellisen | Covert Channel Data Leakage Protection | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Pandya | Local area network security | |
Nayak | Research on application of intrusion detection system in data mining |