Results 31 to 40 of about 166,319 (306)

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

open access: yesApplied Sciences, 2022
The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision.
Yulin Zhou, Lun Xie, Hang Pan
doaj   +1 more source

IOT-Based Farmland Intrusion Detection System

open access: yesBuana Information Technology and Computer Sciences, 2023
As crop vandalization with conflicts between farmers and herdsmen become recurrent in Nigeria, existing farm intrusion prevention methods such as fence mounting and placement of farm guards can no longer guarantee farm security. This is because intruders
Emmanuel Ibam   +2 more
doaj   +1 more source

Nutritional and Behavioral Intervention for Long‐Term Childhood Acute Leukemia Survivors With Metabolic Syndrome

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine   +10 more
wiley   +1 more source

Computer network big data detection based on internet of things technology

open access: yesMeasurement: Sensors
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj   +1 more source

Intrusion detection algorithm for industrial control system of coal mine enterprise

open access: yesGong-kuang zidonghua, 2018
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj   +1 more source

A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System

open access: yesDrones, 2023
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has opened up new possibilities in various industries. However, with the increasing number of Internet of Drones (IoD) networks, the risk of network attacks is also ...
Moran Wu   +5 more
doaj   +1 more source

Cerebrospinal Fluid Liquid Biopsy Enables Targeted Therapy Without Tissue Diagnosis in Pediatric Low‐Grade Gliomas With BRAF V600E Mutation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT We present two pediatric cases of pediatric low‐grade gliomas (PLGG) with BRAF V600E mutations diagnosed and monitored using cerebrospinal fluid (CSF) liquid biopsy analyzed via digital droplet PCR (ddPCR), without tissue biopsy. Both patients were treated with dabrafenib and trametinib and monitored through clinical assessments, magnetic ...
Hannah Sultan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy