Methods of Detecting Intrusions in Security Protocols
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping in the US grew 580% from 1998 to 2000 accounting for...
Other Authors: | Sherwood, Robert William (authoraut) |
---|---|
Format: | Others |
Language: | English English |
Published: |
Florida State University
|
Subjects: | |
Online Access: | http://purl.flvc.org/fsu/fd/FSU_migr_etd-0315 |
Similar Items
-
Ensemble methods in intrusion detection
by: Josiah, Kekere Temitope
Published: (2015) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006) -
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by: Freet, David Nathan
Published: (2017) -
Intrusion detection system : a step ahead in protecting e-commerce security infrastucture
by: Zakaria, Nur Haryani
Published: (2002) -
Using VProbes for intrusion detection
by: Dehnert, Alexander Worthington
Published: (2014)