Results 51 to 60 of about 1,142,874 (336)

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

Portable Intrusion Detection System

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
Every network connection made is exposed to a security threat. Due to this, crucial, confidential, important information can be lost or even exploited by an intruder. Hence an intrusion detection system (IDS) is needed to detect and notify the network administrators if such an event occurs.
Harshitha Prasad Rao   +3 more
openaire   +1 more source

Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach

open access: yesItalian National Conference on Sensors, 2021
Among the key components of a smart grid, advanced metering infrastructure (AMI) has become the preferred target for network intrusion due to its bidirectional communication and Internet connection. Intrusion detection systems (IDSs) can monitor abnormal
Ruizhe Yao   +4 more
semanticscholar   +1 more source

Intrusion detection algorithm for industrial control system of coal mine enterprise

open access: yesGong-kuang zidonghua, 2018
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj   +1 more source

Cyber Attacks on Intrusion Detection System [PDF]

open access: yesInternational Journal of Information Sciences and Techniques, 2016
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire   +1 more source

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Computer network big data detection based on internet of things technology

open access: yesMeasurement: Sensors
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj   +1 more source

Hybrid Intrusion Detection System for Internet of Things (IoT)

open access: yesDecember, 2020
Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity.
Dr. S. Smys   +2 more
semanticscholar   +1 more source

Security of Things Intrusion Detection System for Smart Healthcare

open access: yesElectronics, 2021
Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart healthcare and will continue to be impactful in medical infrastructures in the near future.
C. Iwendi   +3 more
semanticscholar   +1 more source

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

Home - About - Disclaimer - Privacy