Results 41 to 50 of about 199,623 (310)
Intrusion Detection in SCADA Networks [PDF]
Supervisory Control and Data Acquisition (SCADA) systems are a critical part of large industrial facilities, such as water distribution infrastructures. With the goal of reducing costs and increasing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems.
Barbosa, Rafael Ramos Regis, Pras, Aiko
openaire +2 more sources
Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa+2 more
wiley +1 more source
Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.+2 more
core
Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley +1 more source
Intrusion detection is often used in scenarios such as airports and essential facilities. Based on UAVs equipped with optical payloads, intrusion detection from an aerial perspective can be realized.
Yao Xu+4 more
doaj +1 more source
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang+4 more
doaj +1 more source
Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm
In this study, to reduce the influence of The Internet of Things (IoT) illegal intrusion on the transmission effect, and ensure IoT safe operation, an illegal intrusion detection method of the Internet of Things (IoT) based on deep mining algorithm was ...
Xingjuan Fan+4 more
doaj +1 more source
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach [PDF]
Currently available products only provide some support in terms of Intrusion Prevention and Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the limitations of current Intrusion Detection System (IDS) technology, and propose a novel approach - which we call Intrusion Detection & Diagnosis System (ID2S) technology ...
COPPOLINO, Luigi+3 more
openaire +4 more sources
Interaction extracellular vesicles (iEVs) are hybrid vesicles formed through host‐pathogen communication. They facilitate immune evasion, transfer pathogens' molecules, increase host cell uptake, and enhance virulence. This Perspective article illustrates the multifunctional roles of iEVs and highlights their emerging relevance in infection dynamics ...
Bruna Sabatke+2 more
wiley +1 more source
High-speed railway perimeter intrusion detection approach based on Internet of Things
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj +1 more source