Results 221 to 230 of about 290,193 (257)

Indirect Band Edge and Chain‐Locked Linear Dichroism in the Quasi‐1D Van der Waals Antiferromagnet AgCrP2S6

open access: yesAdvanced Functional Materials, EarlyView.
AgCrP2S6 reveals a momentum‐indirect band edge (≈1.35 eV) and chain‐locked linear dichroism: the first direct transitions emerge at 1.6–1.8 eV for E||a. Resonant Raman and photoemission corroborate this assignment. In ACPS/graphene heterostructures, photocurrent turns on above ≈1.5 eV and follows the same polarization selection rules (anisotropy ≈0.53),
Oleksandr Volochanskyi   +9 more
wiley   +1 more source

Network intrusion detection using a hybrid graph-based convolutional network and transformer architecture. [PDF]

open access: yesPLoS One
Appiahene P   +6 more
europepmc   +1 more source

HED-ID: an edge-deployable and explainable intrusion detection system optimized via metaheuristic learning. [PDF]

open access: yesSci Rep
Nasir K   +7 more
europepmc   +1 more source

Network Attack Detection based on Domain Attack Behavior Analysis

2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2020
Network security has become an important issue in our work and life. Hackers' attack mode has been upgraded from normal attack to APT( Advanced Persistent Threat, APT) attack. The key of APT attack chain is the penetration and intrusion of active directory, which can not be completely detected via the traditional IDS and antivirus software.
Weifeng Wang   +5 more
openaire   +1 more source

Attack detection in large networks

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2002
Attacks on large networks are detected using their inherent statistical characteristics. Emphasis is on detecting attacks on the network instead of attacks on computers attached to the network. Denial-of-Service (DoS) attacks and attacks on network components such as routers are detected.
J. May, J. Peterson, J. Bauman
openaire   +1 more source

Network Attack Detection and Mitigation

2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire   +1 more source

Home - About - Disclaimer - Privacy