Results 1 to 10 of about 212,014 (305)

Research on Intrusion Detection Based on User Portrait Technology [PDF]

open access: yesMATEC Web of Conferences, 2022
Under the big data scene, the intrusion detection technology has some problems, such as weak data processing ability, difficulty of precise location and so on.
Wang Zhenduo
doaj   +1 more source

CSI-based passive intrusion detection bound estimation in indoor NLoS scenario

open access: yesFundamental Research, 2023
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj   +1 more source

Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
Aiming at the problems of high false detection rate, difficult to find unknown attack behavior and high cost of obtaining marked data in existing wireless network intrusion detection algorithms based on supervised learning, this paper proposes an ...
DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao
doaj   +1 more source

Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Intrusion detection systems play a vital role in traffic flow monitoring on Internet of Things networks by providing a secure network traffic environment and blocking unwanted traffic packets.
Erman Özer   +2 more
doaj   +1 more source

Network Intrusion Detection [PDF]

open access: yes, 2011
Attacks against computers and the Internet are in the news every week. These primarily take the form of malicious code such as viruses and worms, or denial of service attacks. Less commonly reported are attacks which gain access to computers, either for the purpose of producing damage (such as defacing web sites or deleting data) or for the ...
Yong Shi   +4 more
openaire   +3 more sources

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering

open access: yesIEEE Access, 2023
Network intrusion detection is an important technology in national cyberspace security strategy and has become a research hotspot in various cyberspace security issues in recent years.
Li Zou   +4 more
doaj   +1 more source

Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [PDF]

open access: yesJisuanji kexue, 2021
Intrusion detection plays a vital role in computer network security.Intrusion detection is one of the key technologies of network security and needs to be kept under constant attention.As the network environment becomes more and more complex,network ...
ZHANG Shi-peng, LI Yong-zhong
doaj   +1 more source

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

open access: yesDigital Communications and Networks, 2023
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin   +3 more
doaj   +1 more source

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]

open access: yes, 2012
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de   +4 more
core   +9 more sources

Specification-based Intrusion Detection Method for Greedy Perimeter Stateless Routing [PDF]

open access: yesJisuanji gongcheng, 2017
Aimming at the problem that Greedy Perimeter Stateless Routing(GPSR) protocol is widely applied in Mobile Ad Hoc Network(MANET) and there is no proper intrusion detection technology for it,based on the analysis of intrusion detection technology for MANET,
XU Fu
doaj   +1 more source

Home - About - Disclaimer - Privacy