ips

Also found in: Medical, Acronyms, Encyclopedia, Wikipedia.
(redirected from Intrusion detection)

ips

abbr.
inches per second
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

ips

or i.p.s.,

inches per second.
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
Mentioned in
References in periodicals archive
Baiardi, "CIDS: A Framework for Intrusion Detection in Cloud Systems", Ninth International Conference on Information Technology - New Generations, Las Vegas-NV, pp.
Market Research Future published a research report on "Perimeter Intrusion Detection Systems Market Research Report- Global Forecast till 2023" - Market Analysis, Scope, Stake, Progress, Trends and Forecast to 2023.
Based on these three characteristics several research has been proposed to enhance the performance of intrusion detection such as: Decision Tree (DT), Support Vector Machine (SVM), and Naive Bayesian (NB) [5-8]; k-Nearest neighbor (KNN) [9, 10]; Fuzzy Logic (FL), Genetic Algorithm (GA), and Rough Set (RS) [2, 11, 12]; Artificial Neural Network (ANN) and K-means [13, 14, 77].
In this paper, in order to reduce the energy consumption of sensor nodes participating in intrusion detection activities, we presented a lightweight intrusion detection method based on Fuzzy Clustering Algorithm (LIDFCM) for resource-constrained WSNs.
The focus of our research on ML and DM methods is highly compatible with intrusion detection with the cable-connected network.
In general, intrusion detection approaches can be divided into two categories: misuse-based detection and anomaly-based detection [1-3].
Dorothy Denning [1] defined intrusion detection in 1987.
This intrusion detection system will give the user, better monitoring the network environment and provide an additional tool to make the computing systems secure.
This indicates that success of intrusion detection is limited by the availability of the recent attack signatures in the database.
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.