Results 21 to 30 of about 177,571 (274)
Research on Wireless Sensor Network Intrusion Detection Technology
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang +4 more
doaj +1 more source
An improved bio-inspired based intrusion detection model for a cyberspace
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor +4 more
doaj +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David +3 more
core +1 more source
As the range of security attacks increases across diverse network applications, intrusion detection systems are of central interest. Such detection systems are more crucial for the Internet of Things (IoT) due to the voluminous and sensitive data it ...
Shapla Khanam +3 more
doaj +1 more source
Deep Stacking Network for Intrusion Detection
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj +1 more source
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez +4 more
core +1 more source
Oblivious network intrusion detection systems
Abstract A main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being able to decrypt the rules or the results.
Mahmoud AbdelHafeez Sayed, Mostafa Taha
openaire +3 more sources
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An
Alebachew Chiche, Million Meshesha
doaj +1 more source
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN +3 more
doaj +2 more sources
Flow-based intrusion detection [PDF]
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services.At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing interest in intrusion detection, aiming to timely detect
Sperotto, Anna, Pras, Aiko
openaire +2 more sources

