Results 11 to 20 of about 1,142,874 (336)

SafetyMed: A Novel IoMT Intrusion Detection System Using CNN-LSTM Hybridization

open access: yesElectronics, 2023
The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because of its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption.
Nuruzzaman Faruqui   +7 more
semanticscholar   +1 more source

Anomaly-based intrusion detection system for IoT application

open access: yesDiscover Internet of Things, 2023
Internet-of-Things (IoT) connects various physical objects through the Internet and it has a wide application, such as in transportation, military, healthcare, agriculture, and many more.
Mansi Bhavsar   +3 more
semanticscholar   +1 more source

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

Study on Distributed Intrusion Detection System Based on Artificial Intelligence [PDF]

open access: yesJisuanji kexue, 2022
In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking ...
WANG Lu, WEN Wu-song
doaj   +1 more source

Evaluation of intrusion detection systems [PDF]

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire   +2 more sources

An improved bio-inspired based intrusion detection model for a cyberspace

open access: yesCogent Engineering, 2021
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor   +4 more
doaj   +1 more source

Intrusion Detection Systems [PDF]

open access: yesComputer Fraud & Security, 2001
Abstract In order to answer the opening question, it may help to consider the following scenario. Once upon a time there were isolated villages where everyone trusted everyone else. Little by little, people started to travel from village to village to exchange goods, news and information and life generally got better.
Rebecca Bace, Peter Mell
openaire   +3 more sources

CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System

open access: yesIEEE Access, 2022
Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical ...
A. Halbouni   +5 more
semanticscholar   +1 more source

RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System

open access: yesIEEE Access, 2022
Due to the rapid growth in network traffic and increasing security threats, Intrusion Detection Systems (IDS) have become increasingly critical in the field of cyber security for providing secure communications against cyber adversaries.
Zihan Wu   +3 more
semanticscholar   +1 more source

A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data

open access: yesApplied intelligence (Boston), 2022
The high dimension, complexity, and imbalance of network data are hot issues in the field of intrusion detection. Nowadays, intrusion detection systems face some challenges in improving the accuracy of minority classes detection, detecting unknown ...
Jiyuan Cui   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy