Results 101 to 110 of about 230,799 (122)
Some of the next articles are maybe not open access.

Related searches:

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks

IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi   +3 more
semanticscholar   +1 more source

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh   +2 more
semanticscholar   +1 more source

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

Military Communications and Information Systems Conference, 2015
One of the major research challenges in this field is the unavailability of a comprehensive network based data set which can reflect modern network traffic scenarios, vast varieties of low footprint intrusions and depth structured information about the ...
Nour Moustafa, J. Slay
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy