Results 301 to 310 of about 404,854 (339)
Optimal intrusion detection for imbalanced data using Bagging method with deep neural network optimized by flower pollination algorithm. [PDF]
Sayegh HR+4 more
europepmc +1 more source
An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment. [PDF]
Logeswari G+3 more
europepmc +1 more source
Machine learning based intrusion detection framework for detecting security attacks in internet of things. [PDF]
Kantharaju V+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Lirong Chen+4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Lirong Chen+4 more
openaire +1 more source
Intrusion Detection in VANETs [PDF]
Vehicular Ad hoc Networks commonly abbreviated as VANETs, are an important component of MANET. VANET refers to the group of vehicles that are interlinked to one another through wireless network. Along with technology, comes the threats. Like other wireless networks, VANETs also are vulnerable to various security threats.
Alka Chaudhary, Ajay Rana, Ila Naqvi
openaire +1 more source
An Intrusion-Detection Model [PDF]
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
openaire +2 more sources
Intrusion-Tolerant Intrusion Detection System [PDF]
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire +1 more source
2019
The automation of packet analysis, even partially, is very much desired, because packet analysis is time-consuming and requires technical knowledge and skills. This paper presents the Packet Analysis Ontology (PAO), a novel OWL ontology that covers the terminology of packet analysis, including concepts and properties, as well as their restrictions, to ...
Brooks, David J., Coole, Michael
openaire +3 more sources
The automation of packet analysis, even partially, is very much desired, because packet analysis is time-consuming and requires technical knowledge and skills. This paper presents the Packet Analysis Ontology (PAO), a novel OWL ontology that covers the terminology of packet analysis, including concepts and properties, as well as their restrictions, to ...
Brooks, David J., Coole, Michael
openaire +3 more sources
Overview of intrusion detection and intrusion prevention
Proceedings of the 5th annual conference on Information security curriculum development, 2008This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire +2 more sources