Results 1 to 10 of about 716,223 (232)
E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT [PDF]
This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation
Wai Weng Lo +4 more
semanticscholar +1 more source
Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO +4 more
openaire +5 more sources
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim.
A. Awajan
semanticscholar +1 more source
Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions [PDF]
The rapid development of the Internet and smart devices trigger surge in network traffic making its infrastructure more complex and heterogeneous.
Shaashwat Agrawal +7 more
semanticscholar +1 more source
Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration [PDF]
Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth.
Safiya Sana +4 more
doaj +1 more source
Introduction: This study aims to evaluate and compare the stress distribution in bone and sutures surrounding the mini-implant and the teeth displacement pattern in the maxillary arch during full arch intrusion using a mini-implant, IZC implant, and an ...
Aarti Sethia +4 more
doaj +1 more source
Anomaly-based intrusion detection system for IoT networks through deep learning model
: The Internet of Things (IoT) idea has been developed to enhance people's lives by delivering a diverse range of smart interconnected devices and applications in several domains.
T. Saba +4 more
semanticscholar +1 more source
Background: Deep bite is known as one of the most common malocclusions, and its treatment and retention are often challenging. The use of mini-screws has been suggested as an ideal method for the intrusion of incisors in deep-bite patients.
Erfan Bardideh +5 more
doaj +1 more source
Intrusive and non-intrusive watermarking [PDF]
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire +2 more sources
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad-ul-Haq Qazi +2 more
semanticscholar +1 more source

