Results 31 to 40 of about 1,142,874 (336)
HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System
Nowadays, network attacks are the most crucial problem of modern society. All networks, from small to large, are vulnerable to network threats. An intrusion detection (ID) system is critical for mitigating and identifying malicious threats in networks ...
Muhammad Ashfaq Khan
semanticscholar +1 more source
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An
Alebachew Chiche, Million Meshesha
doaj +1 more source
Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks
Computer security is one of the main challenges of today's technological infrastructures, whereas intrusion detection systems are one of the most widely used technologies to secure computer systems.
F. J. Mora-Gimeno +3 more
doaj +1 more source
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN +3 more
doaj +2 more sources
An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu +5 more
doaj +1 more source
Proposed Hybrid Classifier to Improve Network Intrusion Detection System using Data Mining Techniques [PDF]
Network intrusion detection system (NIDS) is a software system which plays an important role to protect network system and can be used to monitor network activities to detect different kinds of attacks from normal behavior in network traffics.
Sarah Shareef, Soukaena Hashim
doaj +1 more source
The widespread acceptance and increase of the Internet and mobile technologies have revolutionized our existence. On the other hand, the world is witnessing and suffering due to technologically aided crime methods.
R. Panigrahi +6 more
semanticscholar +1 more source
Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users
Muhammad Nadeem +4 more
doaj +1 more source
Intrusion Detection in SCADA Systems
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI).
Leandros A. Maglaras, Jianmin Jiang
openaire +1 more source
A New Ensemble-Based Intrusion Detection System for Internet of Things
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few years by drastically transforming human lives to automate their ordinary daily tasks.
Adeel Abbas +5 more
semanticscholar +1 more source

