Results 201 to 210 of about 11,445 (258)
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems. [PDF]
Medina-Arco JG +3 more
europepmc +1 more source
Nanotherapies for Atherosclerosis: Targeting, Catalysis, and Energy Transduction
Atherosclerosis management is hindered by poor drug targeting and plaque heterogeneity. Nanotechnology overcomes these barriers via three core strategies: (1) target‐engineered nanocarriers that achieve lesion‐specific precision via ligand modification, biomimetic camouflage, stimuli‐responsive release, and self‐propelling nanomotors; (2) catalytic ...
Yuqi Yang +4 more
wiley +1 more source
Human periosteum‐derived cell spheroids bioprinted at high density within a hyaluronic acid matrix promote fusion and hypertrophic cartilage formation in vitro. Early encapsulation enhances spheroid interaction and matrix maturation, generating scalable cartilage templates intended for endochondral bone regeneration.
Ane Albillos Sanchez +6 more
wiley +1 more source
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. [PDF]
Ullah F +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Counselors network for intrusion detection
International Journal of Network Management, 2020SummaryIntrusion detection systems (IDSs) are a fundamental component of defense solutions. In particular, IDSs aim to detect malicious activities on computer systems and networks by relying on data classification models built from a training dataset. However, classifiers' performance can vary for each attack pattern.
Silvio E. Quincozes +5 more
openaire +1 more source
IEEE Network, 1994
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators.
Biswanath Mukherjee +2 more
openaire +1 more source
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators.
Biswanath Mukherjee +2 more
openaire +1 more source
Hybrid network Intrusion Detection
2011 IEEE 7th International Conference on Intelligent Computer Communication and Processing, 2011In this paper we present a novel Intrusion Detection System which uses a hybrid approach based on a pattern matching engine and a neural network functioning in parallel to improve the detection efficiency. The attacks that this module is able to detect will be presented, as well as the methods used.
Cristina Amza +2 more
openaire +1 more source
An efficient network intrusion detection
Computer Communications, 2010Exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network Intrusion Detection system (LNID) is proposed for detecting such attacks on Telnet traffic. It characterizes normal traffic behavior and computes the anomaly score of a packet based on the
Chia-Mei Chen +2 more
openaire +1 more source
The intrusion detection in mobile sensor network
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, 2010Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can be effective for intrusion detection. In response to the recent surge of interest in mobile sensor applications, this paper studies the intrusion detection problem in a mobile
Gabriel Yik Keung +2 more
openaire +2 more sources
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source

