Results 21 to 30 of about 700,206 (362)
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [PDF]
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated.
Barborak+24 more
core +5 more sources
In the last decade, huge growth is recorded globally in computer networks and Internet of Things (IoT) networks due to the exponential data generation, approximately zettabyte to a petabyte.
Amjad Rehman Khan+5 more
semanticscholar +1 more source
Intrusion and intrusion detection [PDF]
Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire +2 more sources
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David+3 more
core +10 more sources
In the Northern Turan's flora by the present moment 134 species of Brassicaceae Burnett family were noted. It was revealed that 96 (71.6%) species among them had the anthropophilous nature of distribution.
P. V. Vesselova
doaj +1 more source
Risk of root intrusion by tree and shrub species into sewer pipes in Swedish urban areas [PDF]
Blockages in sewer pipes caused by roots are very common and several tree and shrub species are reported to be particularly likely to cause root intrusion. This study examined the relative ability of roots of different species to intrude into urban sewer
Ann-Mari Fransson+23 more
core +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert+5 more
core +3 more sources
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are critical aspects that contribute to the success of an organization.
S. M. Kasongo, Yanxia Sun
semanticscholar +1 more source
Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing.
Wenjuan Wang+4 more
semanticscholar +1 more source
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source