Results 221 to 230 of about 177,571 (274)
Intrusion detection using search-based learning optimized ensemble tree classifier model. [PDF]
Alhassan AM, Altmami NI.
europepmc +1 more source
Toward Energy-Efficient and Low-Carbon Intrusion Detection in Edge and Cloud Computing Based on GreenShield Cybersecurity Framework. [PDF]
Alshammari A.
europepmc +1 more source
EHFOA-ID: An Enhanced HawkFish Optimization-Driven Hybrid Ensemble for IoT Intrusion Detection. [PDF]
Alswaid AN, Uçan ON.
europepmc +1 more source
Consumed by Abdominal Distention
Arthritis Care &Research, EarlyView.
Abimbola Fadairo‐Azinge +3 more
wiley +1 more source
Transformer-Based Multi-Source Transfer Learning for Intrusion Detection Models with Privacy and Efficiency Balance. [PDF]
Yang B, Zhang G, Wang K.
europepmc +1 more source
HED-ID: an edge-deployable and explainable intrusion detection system optimized via metaheuristic learning. [PDF]
Nasir K +7 more
europepmc +1 more source
Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]
Abdulganiyu OH +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen +3 more
+4 more sources
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen +3 more
+4 more sources
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source

