IDS
62 Followers
Recent papers in IDS
Diplomsko delo popisuje in razčlenjuje zgodovino študentskih gibanj v Sloveniji. Poleg začetnih poglavij, ki zaobjemajo študentsko gibanje v 20. stoletju, se osrednji del koncentrira na sodobno zgodovino 21. stoletja, v čas oživljanja... more
Mobile Ad-Ho c Network (MANET) is one of the most promising technologi es that have applications in military, environm ental, space exploration and forestry industry areas. This typ e of network has attractive features such as its low... more
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
"Network intrusion detection system (NIDS)" monitors traffic on a network looking for doubtful activity, which could be an attack or illegal activity. The intrusion detection techniques based upon data mining are generally plummet into... more
The use of the Internet has increased in all areas in recent years. With the huge growth and use of the internet increasing, there have been an increase in the number of intrusions and hackers. The risk of intrusion in the network... more
In In spite of the tremendous growth of technologies in computer networking and information technology, still we lack in preventing our resources from theft/attacks. This problem is very big as far as industry / companies are concerned.... more
With the increased dependence of organizations on technological solutions, the cyber threats have become some of the major concerns for the very existence of the businesses. Thus, the security measures to be implemented need to go beyond... more
व्यक्ति के व्यवहार का निर्धारण स्वयं केवल व्यक्ति के द्वारा नहीं होता है अपितु उसका व्यवहार पर्यावरण, आय-व्यय, राजनीति, शिक्षा, पास-पड़ोस, स्वानुभव, परिवार, समाज, सस्कृति, धर्म, जाति, राष्ट्र एवं तात्कालिक परिस्थितियों आदि से निर्धारित... more
Onomatopoeia are frequently identified amongst infants’ earliest words (Menn & Vihman, 2011), yet few authors have considered why this might be, and even fewer have explored this phenomenon empirically. Here we analyze mothers’ production... more
It is the aim of this study to establish live neonatal nurse and parental infant-directed singing as a potentially efficacious intervention that is beneficial to the health and development of infants in neonatal care and which could... more
Plant acclimation to stress is associated with profound changes in proteome composition. Since proteins are directly involved in plant stress response, proteomics studies can significantly contribute to unravel the possible relationships... more
Hybrid intrusion detection systems that make use of data mining techniques, in order to improve effectiveness, have been actively pursued in the last decade. However, their complexity to build detection models has become very expensive... more
In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we... more
Data Security has become a very serious part of any organizational information system. Internet threats have become more intelligent so it can deceive the basic security solutions such as firewalls and antivirus scanners. To enhance the... more
Abstract: In this paper, we discuss the cloud security issues. Cloud computing is a “network of network” over the internet, therefore, chances of intrusion is more with the erudition of intrusion attack. Cloud system security is one of... more
... Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley. [2] Mokube, I. & Adams M., 2007. ... (2007a). Know your enemy: Honeynets. ... [24] Provos N. and Holz T. 2007, Virtual Honeypots : From Botnets... more