Results 311 to 320 of about 700,206 (362)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi+3 more
semanticscholar +1 more source
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi+3 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh+2 more
semanticscholar +1 more source
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh+2 more
semanticscholar +1 more source
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
IEEE Transactions on Industrial Informatics, 2020The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, and artificial intelligence), have dramatically increased the attack surface of industrial cyber ...
Beibei Li+5 more
semanticscholar +1 more source
Overview of intrusion detection and intrusion prevention
Proceedings of the 5th annual conference on Information security curriculum development, 2008This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire +2 more sources
Intrusion-Tolerant Intrusion Detection System [PDF]
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire +1 more source
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
IEEE Internet of Things Journal, 2021
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential.
Tim M. Booij+4 more
semanticscholar +1 more source
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential.
Tim M. Booij+4 more
semanticscholar +1 more source