Results 31 to 40 of about 212,014 (305)

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

open access: yesTongxin xuebao, 2023
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN   +3 more
doaj   +2 more sources

Flow-based intrusion detection [PDF]

open access: yes12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services.At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing interest in intrusion detection, aiming to timely detect
Sperotto, Anna, Pras, Aiko
openaire   +2 more sources

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]

open access: yes, 2012
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day   +2 more
core   +2 more sources

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

open access: yesInternet of Things and Cyber-Physical Systems
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma   +2 more
doaj   +1 more source

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

open access: yesIEEE Access, 2018
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad   +3 more
doaj   +1 more source

A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning

open access: yesHeliyon, 2022
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie   +4 more
doaj   +1 more source

CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network

open access: yesDiscrete Dynamics in Nature and Society, 2020
Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and
Guojie Liu, Jianbiao Zhang
doaj   +1 more source

Nutritional and Behavioral Intervention for Long‐Term Childhood Acute Leukemia Survivors With Metabolic Syndrome

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine   +10 more
wiley   +1 more source

An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.

open access: yesPLoS ONE, 2019
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy