Results 31 to 40 of about 716,322 (331)

Deep Learning Approach for Intelligent Intrusion Detection System

open access: yesIEEE Access, 2019
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host-level in a timely and automatic manner.
R. Vinayakumar   +5 more
semanticscholar   +1 more source

A Survey of Network-based Intrusion Detection Data Sets [PDF]

open access: yesComputers & security, 2019
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work provides a focused literature survey of data sets for network-based intrusion detection and describes the underlying packet- and flow-based
Markus Ring   +4 more
semanticscholar   +1 more source

A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization

open access: yesPeerJ Computer Science, 2023
Intrusion detection ensures that IoT can protect itself against malicious intrusions in extensive and intricate network traffic data. In recent years, deep learning has been extensively and effectively employed in IoT intrusion detection.
Zhendong Wang   +5 more
semanticscholar   +1 more source

Machine Learning Algorithms for Raw and Unbalanced Intrusion Detection Data in a Multi-Class Classification Problem

open access: yesApplied Sciences, 2023
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications.
Mantas Bacevicius   +1 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Intrusion and apical resorption of mandibular incisors in Begg treatment: anchorage bend or curve?

open access: yesAustralasian Orthodontic Journal, 1990
A statistical evaluation of the apical root resorption in mandibular incisors following Begg treatment in one group with anchorage bends and another group with anchorage curves showed no statistical difference.
Lew Kenneth
doaj   +1 more source

RETENSI DAN INTRUNSI FLUOR PADA PERMUKAAN EMAIL SETELAH APLIKASI DENGAN SUBSTRAT IKAN TERI (Stolephorus sp.)

open access: yesJournal of Dentistry Indonesia, 2015
Background: Topical fluoridation recently is still the main caries prevention method. Fluoride application on enamel surface is aimed to convert the hydroxyapatite (HA) crystal to fluoroapatite (FA) or hydroxyfluoroapatite (HFA) form.
Harun Asyiq Gunawan
doaj   +1 more source

Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset

open access: yesJournal of Big Data, 2020
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are critical aspects that contribute to the success of an organization.
S. M. Kasongo, Yanxia Sun
semanticscholar   +1 more source

PTSD Among Healthcare Workers During the COVID-19 Outbreak: A Study Raises Concern for Non-medical Staff in Low-Risk Areas

open access: yesFrontiers in Psychiatry, 2021
Objective: To investigate the prevalence of sleep quality and post-traumatic stress disorder (PTSD) symptoms of healthcare workers (HCWs) and identify the determinants for PTSD symptoms among HCWs in high-risk and low-risk areas during the COVID-19 ...
Ruike Zhang   +13 more
doaj   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy