Results 281 to 290 of about 162,879 (307)
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. [PDF]
Ullah F +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Intrusion-Detection- und -Prevention-Systeme
2021Enterprise security platforms clearly need the ability to prevent and detect intrusions—which we’ll succinctly define here as unwanted software execution or unwanted human activity on an enterprise device or network. Intrusion Detection Systems (IDS) provide the ability to detect, log, and alert on suspicious activity, and Intrusion Prevention Systems (
Jason Garbis, Jerry W. Chapman
openaire +1 more source
Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System
2019New information and communication technologies are increasingly dominating our daily lives to the point of becoming indispensable. The computerization of society is now a reality, no sector is aloof from this transformation. This human invention, which has made progress, certainly facilitated the lives of human beings, but at the same time generated ...
El Mostafa Rajaallah +2 more
openaire +1 more source
Intrusion-Tolerant Intrusion Detection System
2004Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire +1 more source
2005
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik +2 more
openaire +1 more source
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik +2 more
openaire +1 more source
2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +1 more source
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire +1 more source
2021
The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware.
Riya Bilaiya +2 more
openaire +1 more source
The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware.
Riya Bilaiya +2 more
openaire +1 more source

