Results 31 to 40 of about 53,015 (296)
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie +4 more
doaj +1 more source
Intrusion Detection System [PDF]
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Sangram Nevse +4 more
openaire +1 more source
Behavioral Intrusion Detection [PDF]
In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of ethology to help us describe and characterize behavior and interactions. We briefly introduce a general framework for behavior detection and an algorithm for building a Markov-based model ...
openaire +3 more sources
Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa +2 more
wiley +1 more source
Intrusion Detection in SCADA Networks [PDF]
Supervisory Control and Data Acquisition (SCADA) systems are a critical part of large industrial facilities, such as water distribution infrastructures. With the goal of reducing costs and increasing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems.
Barbosa, Rafael Ramos Regis, Pras, Aiko
openaire +2 more sources
Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley +1 more source
Intrusion detection is often used in scenarios such as airports and essential facilities. Based on UAVs equipped with optical payloads, intrusion detection from an aerial perspective can be realized.
Yao Xu +4 more
doaj +1 more source
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang +4 more
doaj +1 more source
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda +5 more
wiley +1 more source
High-speed railway perimeter intrusion detection approach based on Internet of Things
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj +1 more source

