• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: Intrusion Detection" (7)
  1. 1. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  2. 2. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  3. 3. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  4. 4. Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls
  5. 5. Network based Anomaly Intrusion Detection using Bayesian Network Techniques
  6. 6. An Analysis of Intrusion Pattern Based on Backpropagation Algorithm
    Woo Chong-Woo, Kim Sang-Young, Vol. 5, No. 5, pp. 93-104, Oct. 2004
    Keywords: Intrusion Detection System, Back-propagation, KDD Cup '99
  7. 7. Intrusion Detection System Using the Correlation of Intrusion Signature