Results 1 to 10 of about 594,543 (240)

Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [PDF]

open access: yesSensors 2009, vol. 9(8), pp. 5989-6007, 2009
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated.
Barborak   +24 more
core   +6 more sources

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +3 more sources

Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]

open access: yesDental Press Journal of Orthodontics, 2021
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO   +4 more
openaire   +6 more sources

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone [PDF]

open access: yesEAI Endorsed Transactions on Security and Safety, 2020
It is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important.
Yuan He   +3 more
doaj   +1 more source

Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network [PDF]

open access: yesEAI Endorsed Transactions on Security and Safety, 2020
The application of machine learning and deep learning in the field of vulnerability detection is a hot topic in security research, but currently it faces the problem of lack of dataset.
Mingxin Sun   +4 more
doaj   +1 more source

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

open access: yesDe Computis, 2023
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim.
A. Awajan
semanticscholar   +1 more source

PTSD Among Healthcare Workers During the COVID-19 Outbreak: A Study Raises Concern for Non-medical Staff in Low-Risk Areas

open access: yesFrontiers in Psychiatry, 2021
Objective: To investigate the prevalence of sleep quality and post-traumatic stress disorder (PTSD) symptoms of healthcare workers (HCWs) and identify the determinants for PTSD symptoms among HCWs in high-risk and low-risk areas during the COVID-19 ...
Ruike Zhang   +13 more
doaj   +1 more source

Interdisciplinary approach for pathologic tooth migration in advanced periodontal disease patient

open access: yesDental Journal, 2022
Background: Recent treatment trends have included an interdisciplinary approach to cases and have stressed the importance of orthodontic treatment in optimising the prognosis for patients with periodontal disease.
Marie Louisa
doaj   +1 more source

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2018
Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network ...
Yisroel Mirsky   +3 more
semanticscholar   +1 more source

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +3 more sources

Home - About - Disclaimer - Privacy