Digital Library
Search: "[ keyword: Intrusion Detection System ]" (14)
Intrusion Detection-Based Access Control Algorithm for PostgreSQL Based on Front-End Back-End Protocols
Seong-Hoon Jwa, Seung-Hee Kim The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 595-607,
Aug.
2025
https://doi.org/10.3745/TKIPS.2025.14.8.595
Keywords: Database access control, FEBE Protocol Analysis, intrusion detection system (IDS), PostgreSQL Security

Keywords: Database access control, FEBE Protocol Analysis, intrusion detection system (IDS), PostgreSQL Security
Optimization of HIDS Sliding Window Parameters for Enhanced Security: A Risk Tolerance-Based Approach
Park Sang Joon, Kim Mi Soo The Transactions of the Korea Information Processing Society,
Vol. 14, No. 7, pp. 506-515,
Jul.
2025
https://doi.org/10.3745/TKIPS.2025.14.7.506
Keywords: Microservice Architecture (MSA), Host-based Intrusion Detection System (HIDS), sliding window, Risk Tolerance, Container security, Parameter optimization

Keywords: Microservice Architecture (MSA), Host-based Intrusion Detection System (HIDS), sliding window, Risk Tolerance, Container security, Parameter optimization
The Hybrid Model using SVM and Decision Tree for Intrusion Detection
Nam Kyoung Um , Sung Hee Woo , Sang Ho Lee The KIPS Transactions:PartC,
Vol. 14, No. 1, pp. 1-6,
Feb.
2007
10.3745/KIPSTC.2007.14.1.1

Design and Implementation of Sensor based Intrusion Detection System
Jong Moo Choi , Seong Je Cho The KIPS Transactions:PartC,
Vol. 12, No. 6, pp. 865-874,
Oct.
2005
10.3745/KIPSTC.2005.12.6.865

A Statistic-based Response System against DDoS Using Legitimated IP Table
Pil Yong Park , Choong Seon Hong , Sang Hyun Choi The KIPS Transactions:PartC,
Vol. 12, No. 6, pp. 827-838,
Oct.
2005
10.3745/KIPSTC.2005.12.6.827

Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
Jung Sook Jang , Yong Hee Jeon , Jong Soo Jang The KIPS Transactions:PartC,
Vol. 12, No. 6, pp. 817-826,
Oct.
2005
10.3745/KIPSTC.2005.12.6.817

A Combination of Signature-based IDS and Machine Learning-based IDS using Alpha-cut and Beta pick
Ill Young Weon , Doo Heon Song , Chang Hoon Lee The KIPS Transactions:PartC,
Vol. 12, No. 4, pp. 609-616,
Aug.
2005
10.3745/KIPSTC.2005.12.4.609

An Optimum-adaptive Intrusion Detection System Using a Mobile Code
Se Chung Pang , Yang Woo Kim , Yoon Hee Kim , Phil Woo Lee The KIPS Transactions:PartC,
Vol. 12, No. 1, pp. 45-52,
Feb.
2005
10.3745/KIPSTC.2005.12.1.45

Experiments on An Network Processor-based Intrusion Detection
Hyeong Ju Kim , Ik Kyun Kim , Dae Chul Park The KIPS Transactions:PartC,
Vol. 11, No. 3, pp. 319-326,
Jun.
2004
10.3745/KIPSTC.2004.11.3.319

Applying Packet based Machine Learning Algorithm to Misuse IDS for Better Performance
Ill Young Weon , Doo Heon Song , Chang Hoon Lee The KIPS Transactions:PartC,
Vol. 11, No. 3, pp. 301-308,
Jun.
2004
10.3745/KIPSTC.2004.11.3.301
