Results 271 to 280 of about 571,931 (308)
Understanding the Adversary: A Survey of Adversarial Machine Learning in Network Intrusion Detection
Allan da S. Espindola +4 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Intrusion-Tolerant Intrusion Detection System
2004Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire +1 more source
Intrusive advising and intrusive advice
Disability Compliance for Higher EducationYou may have heard the term intrusive advising — sometimes referred to as proactive or engaged advising. This approach emphasizes that advisors should take the initiative to reach out to students, rather than waiting for students to seek support on their own.
openaire +1 more source
Studies in Applied Mathematics, 1997
Intrusive gravity currents arise when a fluid of intermediate density intrudes into an ambient fluid. These intrusions may occur in both natural and human‐made settings and may be the result of a sudden release of a fixed volume of fluid or the steady or time‐dependent injection of such a fluid.
D'Alessio, S. J. D. +3 more
openaire +2 more sources
Intrusive gravity currents arise when a fluid of intermediate density intrudes into an ambient fluid. These intrusions may occur in both natural and human‐made settings and may be the result of a sudden release of a fixed volume of fluid or the steady or time‐dependent injection of such a fluid.
D'Alessio, S. J. D. +3 more
openaire +2 more sources

