Results 1 to 10 of about 63,268 (75)

Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [PDF]

open access: yesSensors 2009, vol. 9(8), pp. 5989-6007, 2009
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes ...
arxiv   +1 more source

Intrusive acceleration strategies for Uncertainty Quantification for hyperbolic systems of conservation laws [PDF]

open access: yes, 2019
Methods for quantifying the effects of uncertainties in hyperbolic problems can be divided into intrusive and non-intrusive techniques. Non-intrusive methods allow the usage of a given deterministic solver in a black-box manner, while being embarrassingly parallel.
arxiv   +1 more source

Open Set Dandelion Network for IoT Intrusion Detection [PDF]

open access: yesarXiv, 2023
As IoT devices become widely, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain ...
arxiv  

Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach [PDF]

open access: yesarXiv, 2023
Data scarcity hinders the usability of data-dependent algorithms when tackling IoT intrusion detection (IID). To address this, we utilise the data rich network intrusion detection (NID) domain to facilitate more accurate intrusion detection for IID domains.
arxiv  

Non-intrusive and semi-intrusive uncertainty quantification of a multiscale in-stent restenosis model [PDF]

open access: yes, 2020
Uncertainty estimations are presented of the response of a multiscale in-stent restenosis model, as obtained by both non-intrusive and semi-intrusive uncertainty quantification. The in-stent restenosis model is a fully coupled multiscale simulation of post-stenting tissue growth, in which the most costly submodel is the blood flow simulation. Surrogate
arxiv   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]

open access: yes, 2012
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system ...
arxiv   +1 more source

Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection [PDF]

open access: yesarXiv, 2023
As Internet of Things devices become prevalent, using intrusion detection to protect IoT from malicious intrusions is of vital importance. However, the data scarcity of IoT hinders the effectiveness of traditional intrusion detection methods. To tackle this issue, in this paper, we propose the Adaptive Bi-Recommendation and Self-Improving Network ...
arxiv  

Active Learning for Wireless IoT Intrusion Detection [PDF]

open access: yesIEEE Wireless Communications, 25 (2018) 19-25, 2018
Internet of Things (IoT) is becoming truly ubiquitous in our everyday life, but it also faces unique security challenges. Intrusion detection is critical for the security and safety of a wireless IoT network. This paper discusses the human-in-the-loop active learning approach for wireless intrusion detection. We first present the fundamental challenges
arxiv   +1 more source

An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [PDF]

open access: yes, 2010
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications.
arxiv   +1 more source

FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems [PDF]

open access: yesarXiv, 2012
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years.
arxiv  

Home - About - Disclaimer - Privacy