Smartphones Hotspots Intrusion Detection System (SHIDS)

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection on Smartphones

Smartphone technology is more and more becoming the predominant communication tool for people across the world. People use their smartphones to keep their contact data, to browse the internet, to exchange messages, to keep notes, carry their personal files and documents, etc. Users while browsing are also capable of shopping online, thus provoking a need to type their credit card numbers and se...

متن کامل

A Survey on Intrusion Detection Systems for Android Smartphones

Smartphones have become a popular and an imperative form of mobile computing devices. With the proliferation of smartphones however, the security threats have correspondingly increased. Although, some form of security mechanisms like authentication and encryption have been provided on platforms such as Android and iOS, these alone cannot mitigate all the forms of threats. Malwares for smartphon...

متن کامل

Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones

The appearance of a new Android platform and its popularity has resulted in a sharp rise in the number of reported vulnerabilities and consequently in the number of mobile threats. Mobile malware, a dominant threat for modern mobile devices, was almost non-existent before the official release of the Android platform in 2008. The rapid development of mobile platform apps and app markets coupled ...

متن کامل

Intrusion Detection System Siemens

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

متن کامل

Intrusion Detection System Models

In the real time Intrusion Detection system, the main confront is to detect the Anomaly Intrusion Detection system Model with ADWIN change Detector. intrusion detection system, that utilizes machine learning techniques such as single classifier and hybrid build the model was decreased and the detection. Intrusion Detection System (IDS) to detect and prevent cybercrimes to protect these The prop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Information Security Research

سال: 2016

ISSN: 2042-4639

DOI: 10.20533/ijisr.2042.4639.2016.0074