Results 221 to 230 of about 177,571 (274)

Consumed by Abdominal Distention

open access: yes
Arthritis Care &Research, EarlyView.
Abimbola Fadairo‐Azinge   +3 more
wiley   +1 more source

HED-ID: an edge-deployable and explainable intrusion detection system optimized via metaheuristic learning. [PDF]

open access: yesSci Rep
Nasir K   +7 more
europepmc   +1 more source

Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]

open access: yesSci Rep
Abdulganiyu OH   +6 more
europepmc   +1 more source

Intrusion Detection

Proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen   +3 more
  +4 more sources

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection

2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu   +4 more
openaire   +1 more source

Intrusion detection

Information Fusion, 2003
Josef Pieprzyk   +2 more
  +5 more sources

Home - About - Disclaimer - Privacy