Results 51 to 60 of about 1,142,874 (336)
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj +1 more source
Portable Intrusion Detection System
Every network connection made is exposed to a security threat. Due to this, crucial, confidential, important information can be lost or even exploited by an intruder. Hence an intrusion detection system (IDS) is needed to detect and notify the network administrators if such an event occurs.
Harshitha Prasad Rao +3 more
openaire +1 more source
Among the key components of a smart grid, advanced metering infrastructure (AMI) has become the preferred target for network intrusion due to its bidirectional communication and Internet connection. Intrusion detection systems (IDSs) can monitor abnormal
Ruizhe Yao +4 more
semanticscholar +1 more source
Intrusion detection algorithm for industrial control system of coal mine enterprise
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj +1 more source
Cyber Attacks on Intrusion Detection System [PDF]
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire +1 more source
Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa +2 more
wiley +1 more source
Computer network big data detection based on internet of things technology
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj +1 more source
Hybrid Intrusion Detection System for Internet of Things (IoT)
Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity.
Dr. S. Smys +2 more
semanticscholar +1 more source
Security of Things Intrusion Detection System for Smart Healthcare
Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart healthcare and will continue to be impactful in medical infrastructures in the near future.
C. Iwendi +3 more
semanticscholar +1 more source
Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley +1 more source

