• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: "[ keyword: Intrusion Detection ]" (12)
  1. 1. Anomaly detection and attack type classification mechanism using Extra Tree and ANN
  2. 2. A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection
  3. 3. A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network
    JiHoon Yoo, Byeongjun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 2, pp. 29-39, Apr. 2021
    Keywords: NSL-KDD, Network intrusion detection, CNN, Discretization of Continuous
  4. 4. Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder
    Byeoungjun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 1, pp. 13-22, Feb. 2021
    Keywords: Anomaly Detection, Network intrusion detection, Autoencoder, NSL-KDD
  5. 5. A study on evaluation method of NIDS datasets in closed military network
    Yong-bin Park, Sung-uk Shin, In-sup Lee, Vol. 21, No. 2, pp. 121-130, Apr. 2020
    Keywords: dataset, Network intrusion detection system, Data evaluation, Machine Learning
  6. 6. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  7. 7. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  8. 8. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  9. 9. Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls
  10. 10. Network based Anomaly Intrusion Detection using Bayesian Network Techniques