Results 51 to 60 of about 291,448 (281)

An attack detection method based on deep learning for internet of things

open access: yesScientific Reports
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu   +4 more
doaj   +1 more source

The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling

open access: yesIEEE Access, 2020
Recently, many anomaly intrusion detection algorithms have been developed and applied in network security. These algorithms achieve high detection rate on many classical datasets.
Lijian Sun   +4 more
doaj   +1 more source

The detection method of Network attacks in Campus Network [PDF]

open access: yesAdvances in Engineering Research, 2015
In the process of the detection method of network attacks in campus network, with current algorithm, there are defects such as high demand for data and low detection rate for model. Therefore, a network attack detection method based on improved Hidden Markov Model algorithm is proposed.
openaire   +1 more source

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Network Attacks Detection by Hierarchical Neural Network

open access: yesComputer Engineering and Applications Journal, 2015
Intrusion detection is an emerging area of research in the computer security and net-works with the growing usage of internet in everyday life. Most intrusion detection systems (IDSs) mostly use a single classifier algorithm to classify the network traffic data as normal behavior or anomalous.
Mohammad Hassan Nattaj   +1 more
openaire   +1 more source

AAA+ protein unfoldases—the Moirai of the proteome

open access: yesFEBS Letters, EarlyView.
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley   +1 more source

Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

open access: yesCybersecurity, 2023
Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly crucial in networks with multi-stage attacks, where multiple nodes are connected to external sources ...
Armita Kazeminajafabadi, Mahdi Imani
doaj   +1 more source

Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

open access: yes, 2018
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN).
Bushnell, Linda   +4 more
core   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Real-time attacks blind detection and analysis algorithm of mobile internet network

open access: yesDianzi Jishu Yingyong, 2018
Attack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and ...
Shi Erying, Wang Zheng
doaj   +1 more source

Home - About - Disclaimer - Privacy