Results 41 to 50 of about 716,322 (331)

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

open access: yesIEEE Access, 2017
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network.
Chuanlong Yin   +3 more
semanticscholar   +1 more source

Intrusion Detection in the Automotive Domain: A Comprehensive Review

open access: yesIEEE Communications Surveys and Tutorials, 2023
The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit ...
Brooke Elizabeth Kidmose, W. Meng
semanticscholar   +1 more source

RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System

open access: yesIEEE Access, 2022
Due to the rapid growth in network traffic and increasing security threats, Intrusion Detection Systems (IDS) have become increasingly critical in the field of cyber security for providing secure communications against cyber adversaries.
Zihan Wu   +3 more
semanticscholar   +1 more source

A Deep Learning Model for Network Intrusion Detection with Imbalanced Data

open access: yesElectronics, 2022
With an increase in the number and types of network attacks, traditional firewalls and data encryption methods can no longer meet the needs of current network security.
Yanfang Fu   +4 more
semanticscholar   +1 more source

The effect of intrusive orthodontic force on dental pulp of adults versus adolescents

open access: yesDental Research Journal, 2016
Background: There is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. The aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults ...
Mostafa Abtahi   +3 more
doaj   +1 more source

Spatial distribution and risk assessment of microplastics in surface sediments in semi-enclosed waters: a case study of Laizhou Bay

open access: yesFrontiers in Marine Science
Marine ecosystems are the most important sinks for microplastics (MPs) from inland sources, and the input of large quantities of MPs into the oceans poses a serious threat to marine organisms and ecosystems.
Xuzhen Zhang   +17 more
doaj   +1 more source

Interdisciplinary approach for pathologic tooth migration in advanced periodontal disease patient

open access: yesDental Journal, 2022
Background: Recent treatment trends have included an interdisciplinary approach to cases and have stressed the importance of orthodontic treatment in optimising the prognosis for patients with periodontal disease.
Marie Louisa
doaj   +1 more source

IDENTIFIKASI INTRUSI AIR LAUT MENGGUNAKAN METODE VERTICAL ELECTRICAL SOUNDING DI KECAMATAN SAWA

open access: yesJGE, 2022
Air adalah kebutuhan dasar manusia yang digunakan untuk berbagai keperluan dalam kehidupan. Dalam sebuah komunitas , air bersih sering merupakan masalah serius manakala tidak tersedia dalam jumlah yang cukup dan memenuhi baku mutu terutama daerah-daerah ...
Ervy Afriani Arliska   +2 more
doaj   +1 more source

Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review

open access: yesIEEE Access, 2021
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it education, home, vehicles, or healthcare. With the increase in the number of connected devices, several challenges are also coming up with IoT technology ...
Nivedita Mishra, Sharnil Pandya
semanticscholar   +1 more source

An intrusion layer in stationary incompressible fluids Part 2: A solitary wave [PDF]

open access: yes, 2006
The propagation of a solitary wave in a horizontal fluid layer is studied. There is an interfacial free surface above and below this intrusion layer, which is moving at constant speed through a stationary density-stratified fluid system.
Forbes, L.K., Hocking, G.C.
core   +2 more sources

Home - About - Disclaimer - Privacy