Results 21 to 30 of about 404,854 (339)

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +3 more sources

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

An improved bio-inspired based intrusion detection model for a cyberspace

open access: yesCogent Engineering, 2021
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor   +4 more
doaj   +1 more source

Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT)

open access: yesSensors, 2022
As the range of security attacks increases across diverse network applications, intrusion detection systems are of central interest. Such detection systems are more crucial for the Internet of Things (IoT) due to the voluminous and sensitive data it ...
Shapla Khanam   +3 more
doaj   +1 more source

Temporal-based intrusion detection for IoV [PDF]

open access: yesit - Information Technology, 2020
Abstract The Internet of Vehicle (IoV) is an extension of Vehicle-to-Vehicle (V2V) communication that can improve vehicles’ fully autonomous driving capabilities. However, these communications are vulnerable to many attacks. Therefore, it is critical to provide run-time mechanisms to detect malware and stop the attackers before they ...
Hamad, Mohammad   +3 more
openaire   +5 more sources

CSI-based passive intrusion detection bound estimation in indoor NLoS scenario

open access: yesFundamental Research, 2023
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj  

Deep Stacking Network for Intrusion Detection

open access: yesSensors, 2021
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj   +1 more source

Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection

open access: yesJournal of Computer Networks and Communications, 2021
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An
Alebachew Chiche, Million Meshesha
doaj   +1 more source

Efficient intrusion detection scheme based on SVM [PDF]

open access: yes, 2013
The network intrusion detection problem is the focus of current academic research. In this paper, we propose to use Support Vector Machine (SVM) model to identify and detect the network intrusion problem, and simultaneously introduce a new optimization ...
Shrestha, Anup, Zhou, Guangping
core   +1 more source

Intrusion Detection in SCADA Systems

open access: yes, 2014
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI).
Leandros A. Maglaras, Jianmin Jiang
openaire   +14 more sources

Home - About - Disclaimer - Privacy