Results 31 to 40 of about 988,120 (358)
Deep Stacking Network for Intrusion Detection
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj +1 more source
Oblivious network intrusion detection systems
AbstractA main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being able to decrypt the rules or the results.
Mahmoud AbdelHafeez Sayed, Mostafa Taha
openaire +3 more sources
Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj +1 more source
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj +1 more source
A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has opened up new possibilities in various industries. However, with the increasing number of Internet of Drones (IoD) networks, the risk of network attacks is also ...
Moran Wu+5 more
doaj +1 more source
Intrusion detection algorithm for industrial control system of coal mine enterprise
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj +1 more source
Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core
Evaluation of Machine Learning Algorithms for Intrusion Detection System
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task.
Alkasassbeh, Mouhammd+3 more
core +1 more source
Cyber Attacks on Intrusion Detection System [PDF]
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire +2 more sources
Metabolic dysfunction‐associated steatotic liver disease (MASLD) affects nearly one‐third of the global population and poses a significant risk of progression to cirrhosis or liver cancer. Here, we discuss the roles of hepatic dendritic cell subtypes in MASLD, highlighting their distinct contributions to disease initiation and progression, and their ...
Camilla Klaimi+3 more
wiley +1 more source