Login / Signup
INTRUSION DETECTION SYSTEM
2005
2007
2009
2011
2013
2015
2017
2019
2021
2023
2025
2005
2025
Experts
</>
Christoph Busch
Wenjuan Li
Christopher Leckie
Igor V. Kotenko
Guansong Pang
Wenke Lee
Kim-Kwang Raymond Choo
Naser Damer
Ajith Abraham
Weizhi Meng
Michal Choras
Yuval Elovici
Yang Xiang
Nour Moustafa
Rafal Kozik
Quanyan Zhu
Uwe Aickelin
Vijay Varadharajan
Mohammad Zulkernine
Ali A. Ghorbani
Meiling Fang
Frédéric Cuppens
Florian Skopik
Sushil Jajodia
Joel J. P. C. Rodrigues
Jianhua Yang
Ing-Ray Chen
Leandros A. Maglaras
Ehab Al-Shaer
Yu Wang
Raouf Boutaba
Hervé Debar
Steven Furnell
Hussein T. Mouftah
Giovanni Vigna
Bryan Hooi
Pedro Casas
Karl N. Levitt
Lam-for Kwok
1
2
3
4
5
…
25
Venues
</>
CoRR
IEEE Access
Comput. Secur.
Sensors
Comput. Networks
ICC
GLOBECOM
Comput. Commun.
Secur. Commun. Networks
Expert Syst. Appl.
IEEE Internet Things J.
ACSAC
ARES
ICASSP
RAID
Inf. Sci.
INFOCOM
Wirel. Pers. Commun.
IJCNN
IEEE Trans. Ind. Informatics
IEEE Trans. Inf. Forensics Secur.
Comput. Electr. Eng.
Multim. Tools Appl.
LCN
IEEE Trans. Netw. Serv. Manag.
J. Intell. Fuzzy Syst.
IACR Cryptol. ePrint Arch.
HICSS
Neural Comput. Appl.
Concurr. Comput. Pract. Exp.
Future Gener. Comput. Syst.
J. Netw. Comput. Appl.
Clust. Comput.
NOMS
IEEE Trans. Geosci. Remote. Sens.
SMC
Neurocomputing
Security and Management
SAC
1
2
3
4
5
…
118
Related Topics
</>
pitman yor process
malicious code
feature representation
information technology
loosely coupled
home network
multi label
function optimization problems
industrial processes
junction tree
normal traffic
generative and discriminative models
teaching practices
object tracking
tabu search
web documents
linear least squares
error correction
link discovery
graphical user interface
socio economic
intrusion detection system
user friendly
computational power
variable selection
web application development
Related Keywords
</>
intrusion detection system
intrusion detection
network intrusion detection
anomaly detection
unsupervised anomaly detection
distributed intrusion detection
attack detection
intrusion prevention
fraud detection
network intrusion
Popularity
</>
No popularities found. Try to change the filters.
Popularity Trend
</>
0%