Results 61 to 70 of about 1,142,874 (336)
IOT-Based Farmland Intrusion Detection System
As crop vandalization with conflicts between farmers and herdsmen become recurrent in Nigeria, existing farm intrusion prevention methods such as fence mounting and placement of farm guards can no longer guarantee farm security. This is because intruders
Emmanuel Ibam +2 more
doaj +1 more source
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda +5 more
wiley +1 more source
INTRUSION DETECTION SYSTEMS IN A HETEROGENOUS NETWORK ENVIRONMENT [PDF]
This paper deals with a design and implementation of an intrusion detection system in heterogeneous network environment. The work includes work out characteristics of Intrusion detection systems, it`s base classification, development of problematic ...
Martin ŠTANCEL +2 more
doaj +1 more source
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications
The modern automobile is a complex piece of technology that uses the Controller Area Network (CAN) bus system as a central system for managing the communication between the electronic control units (ECUs).
Md. Delwar Hossain +4 more
semanticscholar +1 more source
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi +3 more
wiley +1 more source
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients’ information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and confidentiality
Anar A. Hady +4 more
semanticscholar +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi +4 more
wiley +1 more source
CSI-based passive intrusion detection bound estimation in indoor NLoS scenario
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj +1 more source
Analysis of intrusion detection systems
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko +3 more
openaire +3 more sources
A Supervised Intrusion Detection System for Smart Home IoT Devices
The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive information, is demonstrated by their prominence in our daily lives.
Eirini Anthi +4 more
semanticscholar +1 more source

