Results 41 to 50 of about 199,623 (310)

Intrusion Detection in SCADA Networks [PDF]

open access: yes, 2010
Supervisory Control and Data Acquisition (SCADA) systems are a critical part of large industrial facilities, such as water distribution infrastructures. With the goal of reducing costs and increasing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems.
Barbosa, Rafael Ramos Regis, Pras, Aiko
openaire   +2 more sources

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]

open access: yes, 2010
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.   +2 more
core  

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

A Deep Learning Approach of Intrusion Detection and Tracking with UAV-Based 360° Camera and 3-Axis Gimbal

open access: yesDrones
Intrusion detection is often used in scenarios such as airports and essential facilities. Based on UAVs equipped with optical payloads, intrusion detection from an aerial perspective can be realized.
Yao Xu   +4 more
doaj   +1 more source

An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.

open access: yesPLoS ONE, 2019
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang   +4 more
doaj   +1 more source

Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm

open access: yesTehnički Vjesnik, 2023
In this study, to reduce the influence of The Internet of Things (IoT) illegal intrusion on the transmission effect, and ensure IoT safe operation, an illegal intrusion detection method of the Internet of Things (IoT) based on deep mining algorithm was ...
Xingjuan Fan   +4 more
doaj   +1 more source

From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach [PDF]

open access: yes, 2009
Currently available products only provide some support in terms of Intrusion Prevention and Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the limitations of current Intrusion Detection System (IDS) technology, and propose a novel approach - which we call Intrusion Detection & Diagnosis System (ID2S) technology ...
COPPOLINO, Luigi   +3 more
openaire   +4 more sources

Interaction vesicles as emerging mediators of host‐pathogen molecular crosstalk and their implications for infection dynamics

open access: yesFEBS Letters, EarlyView.
Interaction extracellular vesicles (iEVs) are hybrid vesicles formed through host‐pathogen communication. They facilitate immune evasion, transfer pathogens' molecules, increase host cell uptake, and enhance virulence. This Perspective article illustrates the multifunctional roles of iEVs and highlights their emerging relevance in infection dynamics ...
Bruna Sabatke   +2 more
wiley   +1 more source

High-speed railway perimeter intrusion detection approach based on Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj   +1 more source

Home - About - Disclaimer - Privacy