Saxena, 2017 - Google Patents
Next Generation Intelligent Network Intrusion Prevention SystemSaxena, 2017
- Document ID
- 1892934129142439109
- Author
- Saxena M
- Publication year
External Links
Snippet
Well, there are thousands of books on Network Intrusion Prevention already flooding the market and libraries. The reader may naturally wonder about the need of writing another book on this topic. This book is based on my research report which I have written to get …
- 230000002265 prevention 0 title abstract description 95
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/049—Temporal neural nets, e.g. delay elements, oscillating neurons, pulsed inputs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/0445—Feedback networks, e.g. hopfield nets, associative networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alkhalil et al. | Phishing attacks: A recent comprehensive study and a new anatomy | |
Agarwal et al. | A closer look at intrusion detection system for web applications | |
Joshi et al. | Honeypots: a new paradigm to information security | |
US20120084866A1 (en) | Methods, systems, and media for measuring computer security | |
Fung et al. | Intrusion detection networks: a key to collaborative security | |
Almadhoob et al. | Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans | |
Chen | Guarding against network intrusions | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Haber et al. | Attack vectors | |
Assing et al. | Mobile access safety: Beyond BYOD | |
Buchanan | Introduction to security and network forensics | |
Li | An empirical analysis on threat intelligence: Data characteristics and real-world uses | |
POPOỌLA | An Overview of the Evolutionary and Revolutionary Trends of Computer Network Intrusion and Detection | |
Mack | Cyber security | |
Tom et al. | Cyberspace: Mitigating Against Cyber Security Threats and Attacks | |
Moya | Analysis and evaluation of the snort and bro network intrusion detection systems | |
Paquet | Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide) | |
Jayasekara | Security operations & incident management: Case study analysis | |
Saxena | Next Generation Intelligent Network Intrusion Prevention System | |
Agbogun et al. | Network security management: solutions to network intrusion related problems | |
Lakhani | Deception techniques using Honeypots | |
Rowell | Cyber indicators of compromise: a domain ontology for security information and event management | |
Adiwal et al. | Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection | |
Verwoerd | Active network security | |
Metwally et al. | Hacking Human: Hacking the Weakest Link in the Security Chain |