Results 31 to 40 of about 156,609 (316)

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Deep Stacking Network for Intrusion Detection

open access: yesSensors, 2021
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj   +1 more source

A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System

open access: yesDrones, 2023
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has opened up new possibilities in various industries. However, with the increasing number of Internet of Drones (IoD) networks, the risk of network attacks is also ...
Moran Wu   +5 more
doaj   +1 more source

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

open access: yesApplied Sciences, 2022
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj   +1 more source

Computer network big data detection based on internet of things technology

open access: yesMeasurement: Sensors
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj   +1 more source

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Cyber Attacks on Intrusion Detection System [PDF]

open access: yesInternational Journal of Information Sciences and Techniques, 2016
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire   +2 more sources

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Intrusion detection algorithm for industrial control system of coal mine enterprise

open access: yesGong-kuang zidonghua, 2018
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj   +1 more source

Home - About - Disclaimer - Privacy