Results 81 to 90 of about 291,448 (281)

Fuzzy computation on ensemble deep network for the performance of vampire attack detection model in WSN

open access: yesEURASIP Journal on Wireless Communications and Networking
Context Wireless sensor network (WSN) is susceptible to vampire attacks. It is a type of denial of service (DoS) attack that drains sensor nodes’ energy, leading to network failure. The study addresses the challenge by detecting these attacks to conserve
M. Sudha   +3 more
doaj   +1 more source

Diffusion Spectrum Imaging Maps Early Axonal Loss and a Unique Progressive Signal in Neuronal Intranuclear Inclusion Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang   +10 more
wiley   +1 more source

Network Attack Detection for Business Safety

open access: yesNTU Journal of Engineering and Technology
In the technology age, the use of networks has hugely increased. this led to an increment in the number of attackers.  A network attack is an try to achieve unauthorized access to personnel of an organization’s network, steal data or perform other ...
Fadia Abduljabbar Saeed   +2 more
doaj   +1 more source

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

open access: yesApplied Computing and Informatics, 2019
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram   +1 more
doaj   +1 more source

ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) [PDF]

open access: yes, 2010
In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced. This research aims to solve a hierarchical multi class problem in which the type of attack (DoS,
LAHEEB MOHAMMAD IBRAHIM
core  

Detecting Adversarial Attacks in the Context of Bayesian Networks [PDF]

open access: yes, 2019
In this research, we study data poisoning attacks against Bayesian network structure learning algorithms. We propose to use the distance between Bayesian network models and the value of data conflict to detect data poisoning attacks. We propose a 2-layered framework that detects both one-step and long-duration data poisoning attacks.
Emad Alsuwat   +4 more
openaire   +2 more sources

Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende   +26 more
wiley   +1 more source

Vestibular Patient Journey: Insights From Vestibular Disorders Association (VeDA) Registry

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Vestibular symptoms impose a high burden of disability. Understanding real‐world diagnostic and treatment pathways can identify care gaps and guide interventions. We aimed to characterize symptom profiles, diagnostic trends, provider involvement, and treatment patterns in vestibular disorders.
Ali Rafati   +10 more
wiley   +1 more source

Abnormal Traffic Detection Method for Multi-stage Attacks of Internet of Things Botnets [PDF]

open access: yesJisuanji kexue
To address the problem of how to efficiently detect multi-stage attack behavior of IoT botnet from massive network traffic data,an IoT botnet attack detection method based on multi-scale hybrid residual network(IBAD-MHRN)is proposed.Firstly,in order to ...
CHEN Liang, LI Zhihua
doaj   +1 more source

On the Use of Word Networks to Mimicry Attack Detection [PDF]

open access: yes, 2006
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mimicry attacks [1]. A mimicry attack is a variation of an attack that attempts to pass by as normal behaviour.
Fernando Godínez   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy