Results 21 to 30 of about 162,879 (307)

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

open access: yesTongxin xuebao, 2023
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN   +3 more
doaj   +2 more sources

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

open access: yesSensors, 2022
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu   +5 more
doaj   +1 more source

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

open access: yesIEEE Access, 2021
Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users
Muhammad Nadeem   +4 more
doaj   +1 more source

Intrusion Detection Systems

open access: yesComputer Fraud & Security, 2001
Abstract In order to answer the opening question, it may help to consider the following scenario. Once upon a time there were isolated villages where everyone trusted everyone else. Little by little, people started to travel from village to village to exchange goods, news and information and life generally got better.
Rebecca Bace, Peter Mell
openaire   +2 more sources

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

open access: yesIEEE Access, 2018
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad   +3 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System [PDF]

open access: yes, 2006
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the
Bolzoni, Damiano   +3 more
core   +5 more sources

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

open access: yesApplied Sciences, 2022
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj   +1 more source

Home - About - Disclaimer - Privacy