Movatterモバイル変換


[0]ホーム

URL:


Carver Jr et al., 2000 - Google Patents

Real-time Intrusion Detection Systems

Carver Jr et al., 2000

ViewPDF
Document ID
7213648908799719752
Author
Carver Jr C
Humphries J
Hill J
Publication year
Publication venue
Computer Networks

External Links

Snippet

Real-time Intrusion Detection Systems Page 1 Real-time Intrusion Detection Systems Curtis A. Carver Jr., Jeffrey Humphries, and John MD Hill Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA (carverc@cs.tamu.edu) This paper examines …
Continue reading atwww.researchgate.net (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

PublicationPublication DateTitle
US11522887B2 (en)Artificial intelligence controller orchestrating network components for a cyber threat defense
Devi et al.Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
Hajj et al.Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Mukherjee et al.Network intrusion detection
Garcia-Teodoro et al.Anomaly-based network intrusion detection: Techniques, systems and challenges
Lundin et al.Survey of intrusion detection research
CN119449428A (en) Cross-domain network security strategy automatic generation and protection strategy collaboration method and system
CN119205351A (en) A method and device for tracking and tracing asset risks
Rajasekar et al.Security analytics
LabibComputer security and intrusion detection
Carver JrAdaptive agent-based intrusion response
Xiao et al.SENTINEL: Insider threat detection based on multi-timescale user behavior interaction graph learning
Suresh et al.Detection of malicious activities by AI-Supported Anomaly-Based IDS
Sallay et al.Intrusion detection alert management for high‐speed networks: current researches and applications
Rastogi et al.Network anomalies detection using statistical technique: a chi-square approach
LiAn approach to graph-based modeling of network exploitations
Prabu et al.An automated intrusion detection and prevention model for enhanced network security and threat assessment
LakraHSNORT: A Hybrid intrusion detection system using artificial intelligence with snort
GongIntrusion detection model based on security knowledge in online network courses
Carver Jr et al.Real-time Intrusion Detection Systems
Yampolskiy et al.Computer security: A survey of methods and systems
Avkurova et al.Structural and analytical models for early apt-attacks detection in critical infrastructure
Solanki et al.Intrusion detection technique using data mining approach: survey
Nalavade et al.Intrusion prevention systems: data mining approach
Ahmad et al.Hybrid intrusion detection method to increase anomaly detection by using data mining techniques

[8]
ページ先頭

©2009-2025 Movatter.jp