Card | Table | RUSMARC | |
Handbook of research on intrusion detection systems / Brij B. Gupta and Srivathsan Srinivasagopalan, editors. — 1 online resource — <URL:http://elib.fa.ru/ebsco/2403662.pdf>.Record create date: 8/26/2019 Subject: Computer networks — Security measures.; Intrusion detection systems (Computer security); Computer networks — Security measures.; Intrusion detection systems (Computer security) Collections: EBSCO Allowed Actions: –
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
Group: Anonymous Network: Internet |
Annotation
"This book explores recent developments and applications in intrusion detection systems and intrusion detection security"--.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All |
![]() ![]() ![]() |
||||
Internet | Readers |
![]() ![]() |
||||
![]() |
Internet | Anonymous |
Table of Contents
- Cover
- Title Page
- Copyright Page
- Book Series
- Dedication
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Detailed Table of Contents
- Preface
- Acknowledgment
- Chapter 1: Intelligent User Profiling Based on Sensors and Location Data to Detect Intrusions on Mobile Devices
- Chapter 2: Improved Transmission of Data and Information in Intrusion Detection Environments Using the CBEDE Methodology
- Chapter 3: Machine Learning Techniques for Intrusion Detection
- Chapter 4: Network Attack Detection With SNMP-MIB Using Deep Neural Network
- Chapter 5: A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools
- Chapter 6: Identification and Classification of Cyber Threats Through SSH Honeypot Systems
- Chapter 7: Data Access Management System in Azure Blob Storage and AWS S3 Multi-Cloud Storage Environments
- Chapter 8: Intrusion Detection Systems for Internet of Things
- Chapter 9: Internal and External Threat Analysis of Anonymized Dataset
- Chapter 10: A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
- Chapter 11: A Legal Framework for Healthcare
- Chapter 12: Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs
- Chapter 13: An Attribute-Based Searchable Encryption Scheme for Non-Monotonic Access Structure
- Chapter 14: The State-of-the-Art Cryptography Techniques for Secure Data Transmission
- Chapter 15: Cloud Computing Security
- Chapter 16: Cybersecurity
- Chapter 17: Study of Smartcards Technology
- Compilation of References
- About the Contributors
- Index
Usage statistics
|
Access count: 1
Last 30 days: 0 Detailed usage statistics |