Results 31 to 40 of about 53,015 (296)

A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning

open access: yesHeliyon, 2022
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie   +4 more
doaj   +1 more source

Intrusion Detection System [PDF]

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2020
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Sangram Nevse   +4 more
openaire   +1 more source

Behavioral Intrusion Detection [PDF]

open access: yes, 2004
In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of ethology to help us describe and characterize behavior and interactions. We briefly introduce a general framework for behavior detection and an algorithm for building a Markov-based model ...
openaire   +3 more sources

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Intrusion Detection in SCADA Networks [PDF]

open access: yes, 2010
Supervisory Control and Data Acquisition (SCADA) systems are a critical part of large industrial facilities, such as water distribution infrastructures. With the goal of reducing costs and increasing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems.
Barbosa, Rafael Ramos Regis, Pras, Aiko
openaire   +2 more sources

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

A Deep Learning Approach of Intrusion Detection and Tracking with UAV-Based 360° Camera and 3-Axis Gimbal

open access: yesDrones
Intrusion detection is often used in scenarios such as airports and essential facilities. Based on UAVs equipped with optical payloads, intrusion detection from an aerial perspective can be realized.
Yao Xu   +4 more
doaj   +1 more source

An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.

open access: yesPLoS ONE, 2019
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang   +4 more
doaj   +1 more source

An Adaptive Management Model for Brown Bears in Hokkaido: Based on Total Population and the Number of Nuisance Bears

open access: yesPopulation Ecology, EarlyView.
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda   +5 more
wiley   +1 more source

High-speed railway perimeter intrusion detection approach based on Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj   +1 more source

Home - About - Disclaimer - Privacy