Results 21 to 30 of about 716,322 (331)

Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction [PDF]

open access: yesJournal of Big Data
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities.
Md. Alamin Talukder   +6 more
semanticscholar   +1 more source

Similarity Based Feature Transformation for Network Anomaly Detection

open access: yesIEEE Access, 2020
The fundamental objective behind any network intrusion detection system is to automate the detection process whenever intrusions occur in the network.
Arun Nagaraja   +5 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

open access: yesTransactions on Emerging Telecommunications Technologies, 2020
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately ...
Zeeshan Ahmad   +4 more
semanticscholar   +1 more source

Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks [PDF]

open access: yesKnowledge-Based Systems, 2022
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph ...
Evan Caville   +3 more
semanticscholar   +1 more source

Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea

open access: yesFrontiers in Marine Science, 2020
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui   +12 more
doaj   +1 more source

Intrusion and extrusion of water in hydrophobic nanopores [PDF]

open access: yes, 2017
Heterogeneous systems composed of hydrophobic nanoporous materials and water are capable, depending on their characteristics, of efficiently dissipating (dampers) or storing ("molecular springs") energy.
Casciola, Carlo Massimo   +3 more
core   +1 more source

Survey of intrusion detection systems: techniques, datasets and challenges

open access: yesCybersecurity, 2019
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and
Ansam Khraisat   +3 more
semanticscholar   +1 more source

Resorption of Root Apex during Orthodontic Tooth Intrusion Using Light and Heavy Forces

open access: yesČeská Stomatologie a Praktické Zubní Lékařství, 2014
Introduction, aim: The aim of this prospective study was to find a relationship between the external apical resorption and magnitude of orthodontic force during tooth intrusion.
I. Marek, J. Kučera, M. Kamínek
doaj   +1 more source

Focused Fluid Flow Along the Nootka Fault Zone and Continental Slope, Explorer‐Juan de Fuca Plate Boundary

open access: yesGeochemistry, Geophysics, Geosystems, 2020
Geophysical and geochemical data indicate there is abundant fluid expulsion in the Nootka fault zone (NFZ) between the Juan de Fuca and Explorer plates and the Nootka continental slope.
M. Riedel   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy