Handbook of research on intrusion detection systems:
"This book explores recent developments and applications in intrusion detection systems and intrusion detection security"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores recent developments and applications in intrusion detection systems and intrusion detection security"-- |
Beschreibung: | 27 PDFs (407 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799822431 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00235719 | ||
003 | IGIG | ||
005 | 20200414103036.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200415s2020 pau fobf 001 0 eng d | ||
010 | |z 2019037711 | ||
020 | |a 9781799822431 |q eISBN | ||
020 | |z 1799822435 | ||
020 | |z 9781799822424 |q h/c | ||
024 | 7 | |a 10.4018/978-1-7998-2242-4 |2 doi | |
035 | |a (CaBNVSL)slc00000398 | ||
035 | |a (OCoLC)1151224595 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .H36 2020e | |
082 | 7 | |a 005.8/2 |2 23 | |
245 | 0 | 0 | |a Handbook of research on intrusion detection systems |c Brij B. Gupta and Srivathsan Srinivasagopalan, editors. |
246 | 3 | 0 | |a Intrusion detection systems |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2020. | |
300 | |a 27 PDFs (407 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores recent developments and applications in intrusion detection systems and intrusion detection security"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/15/2020). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Intrusion detection systems (Computer security) | |
650 | 7 | |a Computer networks |x Security measures. |2 fast | |
650 | 7 | |a Intrusion detection systems (Computer security) |2 fast | |
700 | 1 | |a Gupta, Brij |d 1982- |e editor. | |
700 | 1 | |a Srinivasagopalan, Srivathsan |d 1974- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019037711 | |
776 | 0 | 8 | |i Print version: |z 1799822427 |z 9781799822424 |w (DLC) 2019037711 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2242-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00235719 |
---|---|
_version_ | 1804751460388306944 |
adam_text | |
any_adam_object | |
author2 | Gupta, Brij 1982- Srinivasagopalan, Srivathsan 1974- |
author2_role | edt edt |
author2_variant | b g bg s s ss |
author_facet | Gupta, Brij 1982- Srinivasagopalan, Srivathsan 1974- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H36 2020e |
callnumber-search | TK5105.59 .H36 2020e |
callnumber-sort | TK 45105.59 H36 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications. |
ctrlnum | (CaBNVSL)slc00000398 (OCoLC)1151224595 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03691nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00235719</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200414103036.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200415s2020 pau fobf 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019037711</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799822431</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799822435</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799822424</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2242-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1151224595</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H36 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on intrusion detection systems </subfield><subfield code="c">Brij B. Gupta and Srivathsan Srinivasagopalan, editors.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Intrusion detection systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">27 PDFs (407 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores recent developments and applications in intrusion detection systems and intrusion detection security"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/15/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intrusion detection systems (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Srinivasagopalan, Srivathsan</subfield><subfield code="d">1974-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019037711</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799822427</subfield><subfield code="z">9781799822424</subfield><subfield code="w">(DLC) 2019037711</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2242-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00235719 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:55Z |
institution | BVB |
isbn | 9781799822431 |
language | English |
oclc_num | 1151224595 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 27 PDFs (407 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on intrusion detection systems Brij B. Gupta and Srivathsan Srinivasagopalan, editors. Intrusion detection systems Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2020. 27 PDFs (407 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications. Restricted to subscribers or individual electronic text purchasers. "This book explores recent developments and applications in intrusion detection systems and intrusion detection security"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/15/2020). Computer networks Security measures. Intrusion detection systems (Computer security) Computer networks Security measures. fast Intrusion detection systems (Computer security) fast Gupta, Brij 1982- editor. Srinivasagopalan, Srivathsan 1974- editor. IGI Global, publisher. (Original) (DLC)2019037711 Print version: 1799822427 9781799822424 (DLC) 2019037711 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2242-4 Volltext |
spellingShingle | Handbook of research on intrusion detection systems Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications. Computer networks Security measures. Intrusion detection systems (Computer security) Computer networks Security measures. fast Intrusion detection systems (Computer security) fast |
title | Handbook of research on intrusion detection systems |
title_alt | Intrusion detection systems |
title_auth | Handbook of research on intrusion detection systems |
title_exact_search | Handbook of research on intrusion detection systems |
title_full | Handbook of research on intrusion detection systems Brij B. Gupta and Srivathsan Srinivasagopalan, editors. |
title_fullStr | Handbook of research on intrusion detection systems Brij B. Gupta and Srivathsan Srinivasagopalan, editors. |
title_full_unstemmed | Handbook of research on intrusion detection systems Brij B. Gupta and Srivathsan Srinivasagopalan, editors. |
title_short | Handbook of research on intrusion detection systems |
title_sort | handbook of research on intrusion detection systems |
topic | Computer networks Security measures. Intrusion detection systems (Computer security) Computer networks Security measures. fast Intrusion detection systems (Computer security) fast |
topic_facet | Computer networks Security measures. Intrusion detection systems (Computer security) |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2242-4 |
work_keys_str_mv | AT guptabrij handbookofresearchonintrusiondetectionsystems AT srinivasagopalansrivathsan handbookofresearchonintrusiondetectionsystems AT igiglobal handbookofresearchonintrusiondetectionsystems AT guptabrij intrusiondetectionsystems AT srinivasagopalansrivathsan intrusiondetectionsystems AT igiglobal intrusiondetectionsystems |