Results 31 to 40 of about 988,120 (358)

Deep Stacking Network for Intrusion Detection

open access: yesSensors, 2021
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj   +1 more source

Oblivious network intrusion detection systems

open access: yesScientific Reports, 2023
AbstractA main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being able to decrypt the rules or the results.
Mahmoud AbdelHafeez Sayed, Mostafa Taha
openaire   +3 more sources

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

open access: yesApplied Sciences, 2022
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj   +1 more source

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System

open access: yesDrones, 2023
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has opened up new possibilities in various industries. However, with the increasing number of Internet of Drones (IoD) networks, the risk of network attacks is also ...
Moran Wu   +5 more
doaj   +1 more source

Intrusion detection algorithm for industrial control system of coal mine enterprise

open access: yesGong-kuang zidonghua, 2018
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj   +1 more source

Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]

open access: yes, 2012
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core  

Evaluation of Machine Learning Algorithms for Intrusion Detection System

open access: yes, 2018
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task.
Alkasassbeh, Mouhammd   +3 more
core   +1 more source

Cyber Attacks on Intrusion Detection System [PDF]

open access: yesInternational Journal of Information Sciences and Techniques, 2016
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire   +2 more sources

The immunological interface: dendritic cells as key regulators in metabolic dysfunction‐associated steatotic liver disease

open access: yesFEBS Letters, EarlyView.
Metabolic dysfunction‐associated steatotic liver disease (MASLD) affects nearly one‐third of the global population and poses a significant risk of progression to cirrhosis or liver cancer. Here, we discuss the roles of hepatic dendritic cell subtypes in MASLD, highlighting their distinct contributions to disease initiation and progression, and their ...
Camilla Klaimi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy