Results 81 to 90 of about 2,065,929 (403)
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems -- A Brief Survey of Concepts and Approaches [PDF]
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information.
arxiv
Autophagy in cancer and protein conformational disorders
Autophagy plays a crucial role in numerous biological processes, including protein and organelle quality control, development, immunity, and metabolism. Hence, dysregulation or mutations in autophagy‐related genes have been implicated in a wide range of human diseases.
Sergio Attanasio
wiley +1 more source
CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data [PDF]
We propose a neural network architecture for detecting intrusions on the controller area network (CAN). The latter is the standard communication method between the electronic control units (ECUs) of automobiles. However, CAN lacks security mechanisms and
Markus Hanselmann+3 more
semanticscholar +1 more source
Hybrid feature selection technique for intrusion detection system [PDF]
High dimensionality’s problems have make feature selection as one of the most important criteria in determining the efficiency of intrusion detection systems.
Kamarudin, Muhammad Hilmi+2 more
core +1 more source
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj +1 more source
Analysis of intrusion detection systems
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko+3 more
openaire +3 more sources
Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana+2 more
core
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail+3 more
core +1 more source
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever+1 more
wiley +1 more source