Results 111 to 120 of about 230,799 (122)
Some of the next articles are maybe not open access.
IEEE Symposium on Security and Privacy, 1986
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's ...
D. Denning
semanticscholar +1 more source
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's ...
D. Denning
semanticscholar +1 more source
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
IEEE Transactions on Industrial Informatics, 2020The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, and artificial intelligence), have dramatically increased the attack surface of industrial cyber ...
Beibei Li+5 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2021
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential.
Tim M. Booij+4 more
semanticscholar +1 more source
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential.
Tim M. Booij+4 more
semanticscholar +1 more source
IEEE Transactions on Network Science and Engineering, 2021
Controller area network (CAN) is a communication protocol that provides reliable and productive transmission between in-vehicle nodes continuously.
Aziz Ur Rehman+4 more
semanticscholar +1 more source
Controller area network (CAN) is a communication protocol that provides reliable and productive transmission between in-vehicle nodes continuously.
Aziz Ur Rehman+4 more
semanticscholar +1 more source
Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing
IEEE Transactions on Vehicular Technology, 2021The vehicular networks constructed by interconnected vehicles and transportation infrastructure are vulnerable to cyber-intrusions due to the expanded use of software and the introduction of wireless interfaces.
Hong Liu+6 more
semanticscholar +1 more source
Network Intrusion Detection for IoT Security Based on Learning Techniques
IEEE Communications Surveys and Tutorials, 2019Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern.
Nadia Chaabouni+4 more
semanticscholar +1 more source
IEEE/CAA Journal of Automatica Sinica, 2022
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the performance evaluation of an intrusion detection system for ...
M. Ferrag+3 more
semanticscholar +1 more source
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the performance evaluation of an intrusion detection system for ...
M. Ferrag+3 more
semanticscholar +1 more source
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
IEEE Communications Surveys and Tutorials, 2019Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches.
Preeti Mishra+3 more
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2019
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh+4 more
semanticscholar +1 more source
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh+4 more
semanticscholar +1 more source
A Survey of Intrusion Detection for In-Vehicle Networks
IEEE transactions on intelligent transportation systems (Print), 2020The development of the complexity and connectivity of modern automobiles has caused a massive rise in the security risks of in-vehicle networks (IVNs).
Wufei Wu+6 more
semanticscholar +1 more source