Results 31 to 40 of about 212,014 (305)
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN +3 more
doaj +2 more sources
Flow-based intrusion detection [PDF]
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services.At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing interest in intrusion detection, aiming to timely detect
Sperotto, Anna, Pras, Aiko
openaire +2 more sources
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir +2 more
core +2 more sources
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day +2 more
core +2 more sources
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma +2 more
doaj +1 more source
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad +3 more
doaj +1 more source
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie +4 more
doaj +1 more source
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and
Guojie Liu, Jianbiao Zhang
doaj +1 more source
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine +10 more
wiley +1 more source
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang +4 more
doaj +1 more source

