[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Saxena, 2017 - Google Patents

Next Generation Intelligent Network Intrusion Prevention System

Saxena, 2017

Document ID
1892934129142439109
Author
Saxena M
Publication year

External Links

Snippet

Well, there are thousands of books on Network Intrusion Prevention already flooding the market and libraries. The reader may naturally wonder about the need of writing another book on this topic. This book is based on my research report which I have written to get …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/049Temporal neural nets, e.g. delay elements, oscillating neurons, pulsed inputs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0445Feedback networks, e.g. hopfield nets, associative networks

Similar Documents

Publication Publication Date Title
Alkhalil et al. Phishing attacks: A recent comprehensive study and a new anatomy
Agarwal et al. A closer look at intrusion detection system for web applications
Joshi et al. Honeypots: a new paradigm to information security
US20120084866A1 (en) Methods, systems, and media for measuring computer security
Fung et al. Intrusion detection networks: a key to collaborative security
Almadhoob et al. Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans
Chen Guarding against network intrusions
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Haber et al. Attack vectors
Assing et al. Mobile access safety: Beyond BYOD
Buchanan Introduction to security and network forensics
Li An empirical analysis on threat intelligence: Data characteristics and real-world uses
POPOỌLA An Overview of the Evolutionary and Revolutionary Trends of Computer Network Intrusion and Detection
Mack Cyber security
Tom et al. Cyberspace: Mitigating Against Cyber Security Threats and Attacks
Moya Analysis and evaluation of the snort and bro network intrusion detection systems
Paquet Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide)
Jayasekara Security operations & incident management: Case study analysis
Saxena Next Generation Intelligent Network Intrusion Prevention System
Agbogun et al. Network security management: solutions to network intrusion related problems
Lakhani Deception techniques using Honeypots
Rowell Cyber indicators of compromise: a domain ontology for security information and event management
Adiwal et al. Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
Verwoerd Active network security
Metwally et al. Hacking Human: Hacking the Weakest Link in the Security Chain