Results 11 to 20 of about 716,322 (331)
Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies.
Nazia Butt +6 more
doaj +1 more source
Sources and sinks of bottom water oxygen in a seasonally hypoxic fjord
Deoxygenation of the ocean has been occurring over the last half century, particularly in poorly ventilated coastal waters. In coastal and estuarine environments, both the water column and sediments play key roles in controlling oxygen variability.
Subhadeep Rakshit +3 more
doaj +1 more source
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches.
M. Ferrag +3 more
semanticscholar +1 more source
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection [PDF]
Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network ...
Yisroel Mirsky +3 more
semanticscholar +1 more source
E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj +1 more source
Intrusion and intrusion detection [PDF]
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire +2 more sources
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
: With exponential growth in the size of computer networks and developed applications, the significant in-creasing of the potential damage that can be caused by launching attacks is becoming obvious.
Iman Sharafaldin +2 more
semanticscholar +1 more source
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj +1 more source
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source
In the Northern Turan's flora by the present moment 134 species of Brassicaceae Burnett family were noted. It was revealed that 96 (71.6%) species among them had the anthropophilous nature of distribution.
P. V. Vesselova
doaj +1 more source

