<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to choosing the right product for their systems. System programmers will appreciate a classification of the different IDS design and implementation approaches that highlight their practical use. One can never assess an intrusion detection system without knowing the performance measurements involved and the evaluations used to gauge these metrics. This chapter covers to a reasonable extent the above mentioned issues and draws some conclusions.
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 20 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |