Results 271 to 280 of about 716,322 (331)
Some of the next articles are maybe not open access.
Computer Communications, 2020
The entire computing paradigm is changed due to the technological advancements in Information and Communication Technology (ICT). Due to these advancements, various new communication channels are being introduced, out of which the Internet of Things (IoT)
Swarna Priya R.M. +6 more
semanticscholar +1 more source
The entire computing paradigm is changed due to the technological advancements in Information and Communication Technology (ICT). Due to these advancements, various new communication channels are being introduced, out of which the Internet of Things (IoT)
Swarna Priya R.M. +6 more
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2019
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh +4 more
semanticscholar +1 more source
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh +4 more
semanticscholar +1 more source
Internet of Things: A survey on machine learning-based intrusion detection approaches
Comput. Networks, 2019In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to the proliferation of information technologies in everyday life.
K. Costa +4 more
semanticscholar +1 more source
Intrusive advising and intrusive advice
Disability Compliance for Higher EducationYou may have heard the term intrusive advising — sometimes referred to as proactive or engaged advising. This approach emphasizes that advisors should take the initiative to reach out to students, rather than waiting for students to seek support on their own.
openaire +1 more source
A bidirectional LSTM deep learning approach for intrusion detection
Expert systems with applications, 2021Yakubu Imrana +3 more
semanticscholar +1 more source
Military Communications and Information Systems Conference, 2015
Nour Moustafa, J. Slay
semanticscholar +1 more source
Nour Moustafa, J. Slay
semanticscholar +1 more source
On collaborative intrusion detection
2016Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire +2 more sources

