Results 51 to 60 of about 2,566,212 (336)

In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method

open access: yesIEEE transactions on intelligent transportation systems (Print), 2023
The development and applications of mobile communication technologies in intelligent autonomous transportation systems have led to an extraordinary rise in the mount of connected and autonomous vehicles (CAVs).
Xuting Duan   +5 more
semanticscholar   +1 more source

Anomaly detection research using Isolation Forest in Machine Learning

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The study is devoted to assessing the applicability of the Isolation Forest method in the task of detecting anomalies in network traffic data characterized by insufficient markup.
A. S. Kechedzhiev, O. L. Tsvetkova
doaj   +1 more source

Habitat fragmentation and anthropogenic factors affect wildcat Felis silvestris silvestris occupancy and detectability on Mt Etna [PDF]

open access: yes, 2019
Knowledge of patterns of occupancy is crucial for planning sound biological management and for identifying areas which require paramount conservation attention.
Anile S.   +5 more
core   +1 more source

Genetic diversity of the rain tree (Albizia saman) in Colombian seasonally dry tropical forest for informing conservation and restoration interventions [PDF]

open access: yes, 2020
Albizia saman is a multipurpose tree species of seasonally dry tropical forests (SDTFs) of Mesoamerica and northern South America typically cultivated in silvopastoral and other agroforestry systems around the world, a trend that is bound to increase in ...
Allen O. N.   +21 more
core   +1 more source

A Heuristic Approach Using Template Miners for Error Prediction in Telecommunication Networks

open access: yesIEEE Access, 2022
With the appearance of large-scale systems, the size of the generated logs increased rapidly. Almost every software produces such files. Log files contain runtime information of the software, as well as indicate noteworthy events or suspicious behaviors ...
Peter Marjai   +2 more
doaj   +1 more source

Anomaly-based threat detection in smart health using machine learning

open access: yesBMC Medical Informatics and Decision Making
Background Anomaly detection is crucial in healthcare data due to challenges associated with the integration of smart technologies and healthcare. Anomaly in electronic health record can be associated with an insider trying to access and manipulate the ...
Muntaha Tabassum   +5 more
doaj   +1 more source

Community dynamics of insular biotas in space and time [PDF]

open access: yes, 2004
The various features determining species distributions remain enigmatic in ecology. This thesis deals with the spatial and temporal dynamics of land birds on the islands of the Dahlak archipelago, the Red Sea, and of mammals, birds and reptiles among the
Azeria, Ermias Tesfamichael
core  

Evaluating the impact of Hymenoscyphus fraxineus in Trentino (Alps, Northern Italy): first investigations [PDF]

open access: yes, 2017
The spread of Hymenoscyphus fraxineus has been causing great concern regarding the survival of European ash (Fraxinus excelsior) throughout Europe since the 1990s.
Dal Maso, E   +4 more
core   +3 more sources

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction

open access: yesFuture Internet
Wireless Sensor Networks (WSNs) play a critical role in environmental monitoring and early forest fire detection. However, they are susceptible to sensor malfunctions and network intrusions, which can compromise data integrity and lead to false alarms or
Ahshanul Haque, H.S. Soliman
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy