Results 271 to 280 of about 716,322 (331)
Some of the next articles are maybe not open access.

An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture

Computer Communications, 2020
The entire computing paradigm is changed due to the technological advancements in Information and Communication Technology (ICT). Due to these advancements, various new communication channels are being introduced, out of which the Internet of Things (IoT)
Swarna Priya R.M.   +6 more
semanticscholar   +1 more source

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

IEEE Transactions on Emerging Topics in Computing, 2019
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh   +4 more
semanticscholar   +1 more source

Internet of Things: A survey on machine learning-based intrusion detection approaches

Comput. Networks, 2019
In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to the proliferation of information technologies in everyday life.
K. Costa   +4 more
semanticscholar   +1 more source

Intrusive advising and intrusive advice

Disability Compliance for Higher Education
You may have heard the term intrusive advising — sometimes referred to as proactive or engaged advising. This approach emphasizes that advisors should take the initiative to reach out to students, rather than waiting for students to seek support on their own.
openaire   +1 more source

A bidirectional LSTM deep learning approach for intrusion detection

Expert systems with applications, 2021
Yakubu Imrana   +3 more
semanticscholar   +1 more source

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

Military Communications and Information Systems Conference, 2015
Nour Moustafa, J. Slay
semanticscholar   +1 more source

On collaborative intrusion detection

2016
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire   +2 more sources

An Intrusion-Detection Model

IEEE Symposium on Security and Privacy, 1986
D. Denning
semanticscholar   +1 more source

Therapeutic Intrusion

Nursing Management (Springhouse), 1991
R, Davidhizar, M, Bowen
openaire   +2 more sources

Intrusive Thoughts, Intrusiveness

2020
Bart Verkuil, J. F. Brosschot
openaire   +1 more source

Home - About - Disclaimer - Privacy