Results 21 to 30 of about 716,322 (331)
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction [PDF]
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities.
Md. Alamin Talukder +6 more
semanticscholar +1 more source
Similarity Based Feature Transformation for Network Anomaly Detection
The fundamental objective behind any network intrusion detection system is to automate the detection process whenever intrusions occur in the network.
Arun Nagaraja +5 more
doaj +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately ...
Zeeshan Ahmad +4 more
semanticscholar +1 more source
Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks [PDF]
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph ...
Evan Caville +3 more
semanticscholar +1 more source
Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui +12 more
doaj +1 more source
Intrusion and extrusion of water in hydrophobic nanopores [PDF]
Heterogeneous systems composed of hydrophobic nanoporous materials and water are capable, depending on their characteristics, of efficiently dissipating (dampers) or storing ("molecular springs") energy.
Casciola, Carlo Massimo +3 more
core +1 more source
Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and
Ansam Khraisat +3 more
semanticscholar +1 more source
Resorption of Root Apex during Orthodontic Tooth Intrusion Using Light and Heavy Forces
Introduction, aim: The aim of this prospective study was to find a relationship between the external apical resorption and magnitude of orthodontic force during tooth intrusion.
I. Marek, J. Kučera, M. Kamínek
doaj +1 more source
Geophysical and geochemical data indicate there is abundant fluid expulsion in the Nootka fault zone (NFZ) between the Juan de Fuca and Explorer plates and the Nootka continental slope.
M. Riedel +8 more
doaj +1 more source

