Results 21 to 30 of about 15,305 (230)

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

open access: yesIEEE Access, 2021
Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users
Muhammad Nadeem   +4 more
doaj   +1 more source

Intrusion Detection Systems

open access: yesComputer Fraud & Security, 2001
Abstract In order to answer the opening question, it may help to consider the following scenario. Once upon a time there were isolated villages where everyone trusted everyone else. Little by little, people started to travel from village to village to exchange goods, news and information and life generally got better.
Rebecca Bace, Peter Mell
openaire   +2 more sources

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

open access: yesIEEE Access, 2018
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad   +3 more
doaj   +1 more source

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

Deep Stacking Network for Intrusion Detection

open access: yesSensors, 2021
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj   +1 more source

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

open access: yesApplied Sciences, 2022
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj   +1 more source

A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System

open access: yesDrones, 2023
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has opened up new possibilities in various industries. However, with the increasing number of Internet of Drones (IoD) networks, the risk of network attacks is also ...
Moran Wu   +5 more
doaj   +1 more source

Carcinomas and Carcinoid Tumors of the Lungs and Bronchi in Children and Adolescents: The EXPeRT Recommendations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Primary lung carcinomas and bronchial carcinoid tumors (BC) are very rare malignancies in childhood. While typical BC and mucoepidermoid carcinomas are mostly low‐grade, localized tumors with a more favorable prognosis than in adults, necessitating avoidance of overtreatment, adenocarcinomas of the lung are often diagnosed at advanced disease ...
Michael Abele   +19 more
wiley   +1 more source

Computer network big data detection based on internet of things technology

open access: yesMeasurement: Sensors
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj   +1 more source

Home - About - Disclaimer - Privacy