Results 31 to 40 of about 119,256 (176)

Intrusion Detection Algorithm for AMI Based on Improved Online Sequential Extreme Learning Machine [PDF]

open access: yesJisuanji gongcheng, 2020
To address the security threats in the communication between computer network and the Advanced Metering Infrastructure(AMI) for smart grid,this paper proposes an improved intrusion detection algorithm for AMI based on DBN-OS-RKELM.This algorithm uses ...
LIU Feifei, WU Zhongdong, DING Longbin, ZHANG Kai
doaj   +1 more source

Big data technology for computer intrusion detection

open access: yesOpen Computer Science, 2023
In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering ...
Chen Ying
doaj   +1 more source

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]

open access: yes, 2012
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day   +2 more
core   +2 more sources

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

SoK - Network Intrusion Detection on FPGA

open access: yes, 2022
The amount of Internet traffic is ever increasing. With a well maintained network infrastructure, people find their way to Internet forums, video streaming services, social media and webshops on a day-to-day basis. With the growth of the online world, criminal activities have also spread out to the Internet.
Le Jeune, Laurens   +5 more
openaire   +2 more sources

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC

open access: yesICTACT Journal on Communication Technology, 2022
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner.
P Roshni Mol, C Immaculate Mary
doaj   +1 more source

SVM Intrusion Detection Model Based on Compressed Sampling

open access: yesJournal of Electrical and Computer Engineering, 2016
Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data.
Shanxiong Chen   +3 more
doaj   +1 more source

Combined Wireless Network Intrusion Detection Model Based on Deep Learning

open access: yesIEEE Access, 2019
In order to effectively detect wireless network intrusion behavior, a combined wireless network intrusion detection model based on deep learning was proposed. First, a feature database was generated by feature mapping, one-hot encoding, and normalization
Hongyu Yang, Geng Qin, Li Ye
doaj   +1 more source

Home - About - Disclaimer - Privacy