Results 81 to 90 of about 2,065,929 (403)

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems -- A Brief Survey of Concepts and Approaches [PDF]

open access: yesarXiv, 2020
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information.
arxiv  

Autophagy in cancer and protein conformational disorders

open access: yesFEBS Letters, EarlyView.
Autophagy plays a crucial role in numerous biological processes, including protein and organelle quality control, development, immunity, and metabolism. Hence, dysregulation or mutations in autophagy‐related genes have been implicated in a wide range of human diseases.
Sergio Attanasio
wiley   +1 more source

CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data [PDF]

open access: yesIEEE Access, 2019
We propose a neural network architecture for detecting intrusions on the controller area network (CAN). The latter is the standard communication method between the electronic control units (ECUs) of automobiles. However, CAN lacks security mechanisms and
Markus Hanselmann   +3 more
semanticscholar   +1 more source

Hybrid feature selection technique for intrusion detection system [PDF]

open access: yes, 2019
High dimensionality’s problems have make feature selection as one of the most important criteria in determining the efficiency of intrusion detection systems.
Kamarudin, Muhammad Hilmi   +2 more
core   +1 more source

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning

open access: yesApplied System Innovation
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj   +1 more source

Analysis of intrusion detection systems

open access: yesJournal of Mathematics, Mechanics and Computer Science, 2019
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko   +3 more
openaire   +3 more sources

Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]

open access: yes, 2011
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana   +2 more
core  

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy