Results 261 to 270 of about 716,322 (331)
Some of the next articles are maybe not open access.
IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi +3 more
semanticscholar +1 more source
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi +3 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2023
Numerous resource-constrained Internet of Things (IoT) devices make the edge IoT consisting of unmanned aerial vehicles (UAVs) vulnerable to network intrusion. Therefore, it is critical to design an effective intrusion detection system (IDS).
Xiaoqiang He +4 more
semanticscholar +1 more source
Numerous resource-constrained Internet of Things (IoT) devices make the edge IoT consisting of unmanned aerial vehicles (UAVs) vulnerable to network intrusion. Therefore, it is critical to design an effective intrusion detection system (IDS).
Xiaoqiang He +4 more
semanticscholar +1 more source
Knowledge-Based Systems, 2020
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing advanced intrusion detection systems (IDSs).
Arwa Aldweesh, A. Derhab, Ahmed Z. Emam
semanticscholar +1 more source
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing advanced intrusion detection systems (IDSs).
Arwa Aldweesh, A. Derhab, Ahmed Z. Emam
semanticscholar +1 more source
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
IEEE Transactions on Industrial Informatics, 2020The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, and artificial intelligence), have dramatically increased the attack surface of industrial cyber ...
Beibei Li +5 more
semanticscholar +1 more source
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Samuel T. King, Peter M. Chen
openaire +1 more source
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Samuel T. King, Peter M. Chen
openaire +1 more source
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
2008 Third International Conference on Availability, Reliability and Security, 2008In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Liwei Kuang, Mohammad Zulkernine
openaire +1 more source
IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh +2 more
semanticscholar +1 more source
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh +2 more
semanticscholar +1 more source
Intrusion-Tolerant Intrusion Detection System
2004Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire +1 more source
IT Professional, 2010
This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.
openaire +1 more source
This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.
openaire +1 more source
Network Intrusion Detection for IoT Security Based on Learning Techniques
IEEE Communications Surveys and Tutorials, 2019Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern.
Nadia Chaabouni +4 more
semanticscholar +1 more source

