-
1
-
-
84994033247
-
'Using classification algorithms in building models for network intrusion detection,'
-
M. Aljabr, "Using classification algorithms in building models for network intrusion detection," Interna-tional Journal on Numerical and Analytical Methods in Engineering, vol. 3, no. 3, pp. 57-62, 2015
-
(2015)
Interna-tional Journal on Numerical and Analytical Methods in Engineering
, vol.3
, Issue.3
, pp. 57-62
-
-
Aljabr, M.1
-
2
-
-
84944457802
-
'Conception, design and implementation of secured uav combining multi-agent systems and ubiquitous lightweight idps (intrusion detection and prevention system),'
-
K. Boukhdir, A. Boualam, S. Tallaland H. Medromi, and S. Benhadou, "Conception, design and implementation of secured uav combining multi-agent systems and ubiquitous lightweight idps (intrusion detection and prevention system)," International Jour-nal on Engineering Applications, vol. 3, no. 1, pp. 1-5, 2015
-
(2015)
International Jour-nal on Engineering Applications
, vol.3
, Issue.1
, pp. 1-5
-
-
Boukhdir, K.1
Boualam, A.2
Tallaland, H.3
Medromi, S.4
Benhadou, S.5
-
4
-
-
85011561152
-
'An introduction to the artificial immune systems,'
-
L. N. De Castro, "An introduction to the artificial immune systems," in Handbook of Natural Comput-ing, pp. 1575-1597, 2012
-
(2012)
Handbook of Natural Comput-ing
, pp. 1575-1597
-
-
De Castro, L.N.1
-
5
-
-
71649110512
-
'Artificial immune systems as a novel soft computing paradigm,'
-
L. N. De Castro and J. I. Timmis, "Artificial immune systems as a novel soft computing paradigm," Soft Computing, vol. 7, no. 8, pp. 526-544, 2003
-
(2003)
Soft Computing
, vol.7
, Issue.8
, pp. 526-544
-
-
De Castro, L.N.1
Timmis, J.I.2
-
6
-
-
0036613006
-
'Learning and optimization using the clonal selection principle,'
-
L. N. De Castro and F. J. Von Zuben, "Learning and optimization using the clonal selection principle," IEEE Transactions on Evolutionary Computa-tion, vol. 6, no. 3, pp. 239-251, 2002
-
(2002)
IEEE Transactions on Evolutionary Computa-tion
, vol.6
, Issue.3
, pp. 239-251
-
-
De Castro, L.N.1
Von Zuben, F.J.2
-
7
-
-
0037245203
-
'The construction of a boolean competitive neural network using ideas from immunology,'
-
L. N. De Castro, F. J. Von Zuben, and G. A. de Deus, "The construction of a boolean competitive neural network using ideas from immunology," Neurocom-puting, vol. 50, pp. 51-85, 2003
-
(2003)
Neurocom-puting
, vol.50
, pp. 51-85
-
-
De Castro, L.N.1
Von Zuben, F.J.2
de Deus, G.A.3
-
9
-
-
0012234547
-
'Artificial immune systems: A novel paradigm to pattern recognition,'
-
L. N. de Castro and J. Timmis, "Artificial immune systems: A novel paradigm to pattern recognition," Artificial Neural networks in Pattern Recognition, vol. 1, pp. 67-84, 2002
-
(2002)
Artificial Neural networks in Pattern Recognition
, vol.1
, pp. 67-84
-
-
De Castro, L.N.1
Timmis, J.2
-
10
-
-
4344660279
-
'An intrusion detection system using ideas from the immune system,'
-
F. S. de Paula, L. N. de Castro, and P. L. de Geus, "An intrusion detection system using ideas from the immune system," in IEEE Congress on Evolutionary Computation (CEC'04), vol. 1, pp. 1059-1066, 2004
-
(2004)
in IEEE Congress on Evolutionary Computation (CEC'04)
, vol.1
, pp. 1059-1066
-
-
de Paula, F.S.1
de Castro, L.N.2
de Geus, P.L.3
-
11
-
-
84922832566
-
'A review: Mobile ad hoc networks challenges, attacks, security, vulnerability and routing protocols,'
-
M. Enshaei, Z. M. Hanapi, and M. Othman, "A review: Mobile ad hoc networks challenges, attacks, security, vulnerability and routing protocols," Inter-national Journal on Communications Antenna and Propagation, vol. 4, no. 5, pp. 168-179, 2014
-
(2014)
Inter-national Journal on Communications Antenna and Propagation
, vol.4
, Issue.5
, pp. 168-179
-
-
Enshaei, M.1
Hanapi, Z.M.2
Othman, M.3
-
12
-
-
85057643374
-
"Performance assessment of the intrusion detection and prevention systems: According to their features: the method of analysis, reliability,reactivity, facility, adaptability and performance,"
-
Y. Farhaoui and A. Asimi, "Performance assessment of the intrusion detection and prevention systems: According to their features: the method of analysis, reliability,reactivity, facility, adaptability and performance," in The 6th IEEE International Conference on Sciences of Electronics Technologies Information and Telecommunication (SETIT'12), 2006
-
(2006)
The 6th IEEE International Conference on Sciences of Electronics Technologies Information and Telecommunication (SETIT'12)
-
-
Farhaoui, Y.1
Asimi, A.2
-
13
-
-
85014399197
-
'Performance method of assessment of the intrusion detection and prevention systems,'
-
Y. Farhaoui and A. Asimi, "Performance method of assessment of the intrusion detection and prevention systems," International Journal of Engineering Sci-ence and Technology, vol. 3, no. 7, 2011
-
(2011)
International Journal of Engineering Sci-ence and Technology
, vol.3
, Issue.7
-
-
Farhaoui, Y.1
Asimi, A.2
-
14
-
-
85014388994
-
'Model of an effective intrusion detection system on the LAN,'
-
Y. Farhaoui and A. Asimi, "Model of an effective intrusion detection system on the LAN," International Journal of Computer Applications, vol. 41, no. 11, pp. 26-29, 2012
-
(2012)
International Journal of Computer Applications
, vol.41
, Issue.11
, pp. 26-29
-
-
Farhaoui, Y.1
Asimi, A.2
-
15
-
-
85014417476
-
'Performance assessment of tools of the intrusion detection/prevention systems,'
-
Y. Farhaoui and A. Asimi, "Performance assessment of tools of the intrusion detection/prevention systems," International Journal of Computer Science and Information Security, vol. 10, no. 1, pp. 7, 2012
-
(2012)
International Journal of Computer Science and Information Security
, vol.10
, Issue.1
, pp. 7
-
-
Farhaoui, Y.1
Asimi, A.2
-
16
-
-
85028648328
-
'Performance assessment of tools of the intrusion detection and prevention systems,'
-
Morocco, Aug
-
Y. Farhaoui and A. Asimi, "Performance assessment of tools of the intrusion detection and prevention systems," in The 3rd IEEE International Conference on MultimediaComputing and Systems (ICMCS'12), pp. 1-6, Morocco, Aug. 2012
-
(2012)
The 3rd IEEE International Conference on MultimediaComputing and Systems (ICMCS'12)
, pp. 1-6
-
-
Farhaoui, Y.1
Asimi, A.2
-
18
-
-
84947578308
-
'Designing an adversarial model against reactive and proactive routing protocols in manets: A comparative performance study,'
-
A. P Gopi, E. S. Babu, and C. N. Rajuand S. A. Kumar, "Designing an adversarial model against reactive and proactive routing protocols in manets: A comparative performance study," International Journal of Electrical and Computer Engineering, vol. 5, no. 5, 2015
-
(2015)
International Journal of Electrical and Computer Engineering
, vol.5
, Issue.5
-
-
Gopi, A.P.1
Babu, E.S.2
Rajuand, C.N.3
Kumar, S.A.4
-
20
-
-
85014085189
-
'An improved privacy protection security protocol based on NFC,'
-
Jan
-
L. Jie, W. Ying, and W. F. Chen, "An improved privacy protection security protocol based on NFC," International Journal of Network Security, vol. 19, no. 1, pp. 39-46, Jan. 2017
-
(2017)
International Journal of Network Security
, vol.19
, Issue.1
, pp. 39-46
-
-
Jie, L.1
Ying, W.2
Chen, W.F.3
-
21
-
-
84960105209
-
'Novel roadm modelling with wss and obs to improve routing performance in optical network,'
-
G. R. Kavitha and T. S. Indumathi, "Novel roadm modelling with wss and obs to improve routing performance in optical network," International Journal of Electrical and Computer Engineering, vol. 6, no. 2, pp. 700, 2016
-
(2016)
International Journal of Electrical and Computer Engineering
, vol.6
, Issue.2
, pp. 700
-
-
Kavitha, G.R.1
Indumathi, T.S.2
-
24
-
-
35449005874
-
'Immune system approaches to intrusion detection-a review,'
-
J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection-a review," Natural Computing, vol. 6, no. 4, pp. 413-466, 2007
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
25
-
-
85057643369
-
'Artificial immune systems: Part i-basic theory and applications,'
-
F. J. Von Zuben L. N. De Castro, "Artificial immune systems: Part i-basic theory and applications," Universidade Estadual de Campinas, Dezem-bro de, Tech. Rep, vol. 210, no. 1, 1999
-
(1999)
Universidade Estadual de Campinas, Dezem-bro de, Tech. Rep
, vol.210
, Issue.1
-
-
Von Zuben, F.J.1
De Castro, L.N.2
-
27
-
-
85014078012
-
'Automatic generation of security protocol implementations written in java from abstract speci-fications proved in the computational model,'
-
B. Meng, C. T. Huang, Y. Yang, L. Niu, and D.Wang, "Automatic generation of security protocol implementations written in java from abstract speci-fications proved in the computational model," Inter-national Journal of Network Security, vol. 19, no. 1, pp. 138-153, 2017
-
(2017)
Inter-national Journal of Network Security
, vol.19
, Issue.1
, pp. 138-153
-
-
Meng, B.1
Huang, C.T.2
Yang, Y.3
Niu, L.4
Wang, D.5
-
28
-
-
84964242662
-
'Secure and energy efficient intrusion detection in 3d wsn,'
-
T. M. Mubarak, M. Sajitha, G. A. Rao, and S. A. Sattar, "Secure and energy efficient intrusion detection in 3d wsn," International Journal on Informa-tion Technology, vol. 2, no. 2, pp. 48-55, 2014
-
(2014)
International Journal on Informa-tion Technology
, vol.2
, Issue.2
, pp. 48-55
-
-
Mubarak, T.M.1
Sajitha, M.2
Rao, G.A.3
Sattar, S.A.4
-
30
-
-
84871859848
-
"Applying similarities between immune systems and mobile agent systems in intrusion detection,"
-
Citeseer
-
M. Zielinski and L. Venter, "Applying similarities between immune systems and mobile agent systems in intrusion detection," in ISSA, pp. 1-12. Citeseer, 2004. (http://icsa.cs.up.ac.za/issa/ 2004/Proceedings/Full/016.pdf)
-
(2004)
ISSA
, pp. 1-12
-
-
Zielinski, M.1
Venter, L.2
|