Results 51 to 60 of about 150,878 (273)

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Security Enrichment in Intrusion Detection System Using Classifier Ensemble

open access: yesJournal of Electrical and Computer Engineering, 2017
In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in ...
Uma R. Salunkhe, Suresh N. Mali
doaj   +1 more source

Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]

open access: yes, 2011
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana   +2 more
core  

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

A Novel Approach to Android Malware Intrusion Detection Using Zero-Shot Learning GANs

open access: yesSir Syed University Research Journal of Engineering and Technology, 2023
This study proposes an innovative intrusion detection system for Android malware based on a zero-shot learning GAN approach. Our system achieved an accuracy of 99.99%, indicating that this approach can be highly effective for identifying intrusion ...
Syed Atir Raza Shirazi, Mehwish Shaikh
doaj  

CSI-based passive intrusion detection bound estimation in indoor NLoS scenario

open access: yesFundamental Research, 2023
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

open access: yesDigital Communications and Networks, 2023
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy