Results 61 to 70 of about 716,322 (331)
Intrusive luxation is a severe dental injury and may result in complicated healing sequelae. Management and prognosis of these injuries depend on the factors such as severity of intrusion, stage of root development, and time elapsed between injury and ...
Boris Saha +3 more
doaj +1 more source
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.
Mouaad Mohy-Eddine +4 more
doaj +1 more source
Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C. +2 more
core
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network ...
Hongyu Liu, Bo Lang
semanticscholar +1 more source
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi +20 more
wiley +1 more source
An Implementation of Intrusion Detection System Using Genetic Algorithm
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser +2 more
core +2 more sources
An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu +5 more
semanticscholar +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Sensor networks security based on sensitive robots agents. A conceptual model
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim +11 more
core +1 more source
Network Intrusion Detection Model Based on CNN and GRU
A network intrusion detection model that fuses a convolutional neural network and a gated recurrent unit is proposed to address the problems associated with the low accuracy of existing intrusion detection models for the multiple classification of ...
Bo Cao +4 more
semanticscholar +1 more source

