Results 31 to 40 of about 290,193 (257)

Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

open access: yesMathematics, 2022
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu   +3 more
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Secure data collection method of WSN based on mobile Sink

open access: yes网络与信息安全学报, 2021
At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice. To solve this
MIAO Chunyu, FAN Yuan, GE Kaiqiang, ZHANG Xiaomeng   +1 more
doaj   +3 more sources

An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Internet of things (IoT) is a complex and massive wireless network, where millions of devices are connected together. These devices gather different types of data from different systems that transform human daily lives by modernizing home appliances ...
Sabeen Tahir   +2 more
doaj   +1 more source

Sleep Deprivation Attack Detection in Wireless Sensor Network

open access: yes, 2012
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina   +2 more
core   +3 more sources

DoS attacks detection in MQTT networks

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2021
<span>The paper considers the problem of protecting the Internet of things infrastructure against denial-of-service (DoS) attacks at the application level. The authors considered parameters that affect the network gateway workload: message frequency, payload size, number of recipients and some others. We proposed a modular structure of the attack
Dmitrii Dikii   +2 more
openaire   +2 more sources

DDoS Attack Detection Based on Self-organizing Mapping Network in Software Defined Networking

open access: yesMATEC Web of Conferences, 2018
The software defined networking is a new kind of network architecture, the programmability of SDN enables hackers to easily launch DDoS attack on the network through software programming. To solve the problem, a DDoS attack detection scheme based on self-
Zhao Chanchan, Liu Feng
doaj   +1 more source

Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]

open access: yes, 2014
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S.   +3 more
core  

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

open access: yesJournal of Electrical and Computer Engineering, 2014
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of ...
Wenchao Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy