Results 21 to 30 of about 1,142,874 (336)

Weighted Multiclass Intrusion Detection System [PDF]

open access: yesITM Web of Conferences, 2023
Attackers are continuously coming up with new attack strategies since cyber security is a field that is continually changing. As a result, it’s important to update and enhance the system frequently to ensure its efficiency against fresh threats ...
Dange Varsha   +5 more
doaj   +1 more source

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

open access: yesTransactions on Emerging Telecommunications Technologies, 2020
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately ...
Zeeshan Ahmad   +4 more
semanticscholar   +1 more source

Explainable Artificial Intelligence for Intrusion Detection System

open access: yesElectronics, 2022
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks.
S. Patil   +8 more
semanticscholar   +1 more source

Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment

open access: yesElectronics, 2022
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited resources, exposing them to cyberattacks while processing large streams ...
Omar A. Alzubi   +5 more
semanticscholar   +1 more source

Application of data mining technology in detecting network intrusion and security maintenance

open access: yesJournal of Intelligent Systems, 2021
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect.
Zhu Yongkuan   +4 more
doaj   +1 more source

Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels

open access: yesElectronics, 2022
The growing number of security threats has prompted the use of a variety of security techniques. The most common security tools for identifying and tracking intruders across diverse network domains are intrusion detection systems.
Mohammed Amin Almaiah   +9 more
semanticscholar   +1 more source

A new intrusion detection and alarm correlation technology based on neural network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj   +1 more source

Deep Learning Approach for Intelligent Intrusion Detection System

open access: yesIEEE Access, 2019
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host-level in a timely and automatic manner.
R. Vinayakumar   +5 more
semanticscholar   +1 more source

Intrusion Detection System on IoT with 5G Network Using Deep Learning

open access: yesWireless Communications and Mobile Computing, 2022
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed.
N. Yadav   +3 more
semanticscholar   +1 more source

Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning

open access: yesWireless Communications and Mobile Computing, 2022
The Industrial Internet of Things has grown significantly in recent years. While implementing industrial digitalization, automation, and intelligence introduced a slew of cyber risks, the complex and varied industrial Internet of Things environment ...
Sumegh Tharewal   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy