Results 61 to 70 of about 1,142,874 (336)

IOT-Based Farmland Intrusion Detection System

open access: yesBuana Information Technology and Computer Sciences, 2023
As crop vandalization with conflicts between farmers and herdsmen become recurrent in Nigeria, existing farm intrusion prevention methods such as fence mounting and placement of farm guards can no longer guarantee farm security. This is because intruders
Emmanuel Ibam   +2 more
doaj   +1 more source

An Adaptive Management Model for Brown Bears in Hokkaido: Based on Total Population and the Number of Nuisance Bears

open access: yesPopulation Ecology, EarlyView.
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda   +5 more
wiley   +1 more source

INTRUSION DETECTION SYSTEMS IN A HETEROGENOUS NETWORK ENVIRONMENT [PDF]

open access: yesActa Electrotechnica et Informatica, 2020
This paper deals with a design and implementation of an intrusion detection system in heterogeneous network environment. The work includes work out characteristics of Intrusion detection systems, it`s base classification, development of problematic ...
Martin ŠTANCEL   +2 more
doaj   +1 more source

LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications

open access: yesIEEE Access, 2020
The modern automobile is a complex piece of technology that uses the Controller Area Network (CAN) bus system as a central system for managing the communication between the electronic control units (ECUs).
Md. Delwar Hossain   +4 more
semanticscholar   +1 more source

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

open access: yesIEEE Access, 2020
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients’ information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and confidentiality
Anar A. Hady   +4 more
semanticscholar   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

CSI-based passive intrusion detection bound estimation in indoor NLoS scenario

open access: yesFundamental Research, 2023
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj   +1 more source

Analysis of intrusion detection systems

open access: yesJournal of Mathematics, Mechanics and Computer Science, 2019
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko   +3 more
openaire   +3 more sources

A Supervised Intrusion Detection System for Smart Home IoT Devices

open access: yesIEEE Internet of Things Journal, 2019
The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive information, is demonstrated by their prominence in our daily lives.
Eirini Anthi   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy