Results 11 to 20 of about 716,322 (331)

Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks

open access: yesMathematics, 2022
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies.
Nazia Butt   +6 more
doaj   +1 more source

Sources and sinks of bottom water oxygen in a seasonally hypoxic fjord

open access: yesFrontiers in Marine Science, 2023
Deoxygenation of the ocean has been occurring over the last half century, particularly in poorly ventilated coastal waters. In coastal and estuarine environments, both the water column and sediments play key roles in controlling oxygen variability.
Subhadeep Rakshit   +3 more
doaj   +1 more source

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

open access: yesJournal of Information Security and Applications, 2020
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches.
M. Ferrag   +3 more
semanticscholar   +1 more source

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2018
Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network ...
Yisroel Mirsky   +3 more
semanticscholar   +1 more source

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +2 more sources

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

open access: yesInternational Conference on Information Systems Security and Privacy, 2018
: With exponential growth in the size of computer networks and developed applications, the significant in-creasing of the potential damage that can be caused by launching attacks is becoming obvious.
Iman Sharafaldin   +2 more
semanticscholar   +1 more source

Modeling Ice Melt Rates From Seawater Intrusions in the Grounding Zone of Petermann Gletscher, Greenland

open access: yesGeophysical Research Letters, 2023
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

ANTHROPOPHILOUS REPRESENTATIVES OF BRASSICACEAE BURNETT OF THE NORTHERN TURAN (CONSPECTUS OF SPECIES)

open access: yesТруды по прикладной ботанике, генетике и селекции, 2018
In the Northern Turan's flora by the present moment 134 species of Brassicaceae Burnett family were noted. It was revealed that 96 (71.6%) species among them had the anthropophilous nature of distribution.
P. V. Vesselova
doaj   +1 more source

Home - About - Disclaimer - Privacy