Results 321 to 330 of about 700,206 (362)
Some of the next articles are maybe not open access.

Intrusions and perseverations*1

Brain and Language, 1984
Twenty-two subjects with presumed senile dementia of the Alzheimer's type (SDAT), twenty-two with dementia other than SDAT, twenty with aphasia, and seventeen healthy controls over 50 years of age were examined for intrusions and perseverations. Perseverations were defined as the immediate inappropriate repetition of a prior response whereas intrusions
Daniel B. Hier   +2 more
openaire   +3 more sources

CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU

IEEE Transactions on Network Science and Engineering, 2021
Controller area network (CAN) is a communication protocol that provides reliable and productive transmission between in-vehicle nodes continuously.
Aziz Ur Rehman   +4 more
semanticscholar   +1 more source

Network Intrusion Detection for IoT Security Based on Learning Techniques

IEEE Communications Surveys and Tutorials, 2019
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern.
Nadia Chaabouni   +4 more
semanticscholar   +1 more source

Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing

IEEE Transactions on Vehicular Technology, 2021
The vehicular networks constructed by interconnected vehicles and transportation infrastructure are vulnerable to cyber-intrusions due to the expanded use of software and the introduction of wireless interfaces.
Hong Liu   +6 more
semanticscholar   +1 more source

Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions

IEEE/CAA Journal of Automatica Sinica, 2022
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the performance evaluation of an intrusion detection system for ...
M. Ferrag   +3 more
semanticscholar   +1 more source

Intrusive prospective imagery, posttraumatic intrusions and anxiety in schizophrenia

Psychiatry Research, 2015
Trauma exposure and intrusive thoughts are commonly reported in both schizophrenia and posttraumatic stress disorder (PTSD). Information processing accounts suggest that intrusions occur in the two conditions as a result of insufficient state and/or trait contextual processing in long-term memory.
Marco Picchioni   +3 more
openaire   +4 more sources

Network intrusion model for analyzing intrusion patterns

The 6th International Conference on Advanced Communication Technology, 2004., 2004
As the development of internet, the risk of exposing to malicious intrusion via network grows higher and higher. To make it possible defense such a malicious intrusion, it is indispensable to simulate and analyze vulnerabilities of network. In this paper, we propose network intrusion model and intrusion scenario tree lor detecting and analyzing ...
Joo Beom Yoon   +3 more
openaire   +2 more sources

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

IEEE Communications Surveys and Tutorials, 2019
Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches.
Preeti Mishra   +3 more
semanticscholar   +1 more source

Internet intrusions

Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '03, 2003
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging.
Vinod Yegneswaran   +2 more
openaire   +2 more sources

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

IEEE Transactions on Emerging Topics in Computing, 2019
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.
Hamed Haddad Pajouh   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy