Results 31 to 40 of about 119,256 (176)
Intrusion Detection Algorithm for AMI Based on Improved Online Sequential Extreme Learning Machine [PDF]
To address the security threats in the communication between computer network and the Advanced Metering Infrastructure(AMI) for smart grid,this paper proposes an improved intrusion detection algorithm for AMI based on DBN-OS-RKELM.This algorithm uses ...
LIU Feifei, WU Zhongdong, DING Longbin, ZHANG Kai
doaj +1 more source
Big data technology for computer intrusion detection
In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering ...
Chen Ying
doaj +1 more source
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day +2 more
core +2 more sources
Research on Wireless Sensor Network Intrusion Detection Technology
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang +4 more
doaj +1 more source
SoK - Network Intrusion Detection on FPGA
The amount of Internet traffic is ever increasing. With a well maintained network infrastructure, people find their way to Internet forums, video streaming services, social media and webshops on a day-to-day basis. With the growth of the online world, criminal activities have also spread out to the Internet.
Le Jeune, Laurens +5 more
openaire +2 more sources
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir +2 more
core +2 more sources
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner.
P Roshni Mol, C Immaculate Mary
doaj +1 more source
SVM Intrusion Detection Model Based on Compressed Sampling
Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data.
Shanxiong Chen +3 more
doaj +1 more source
Combined Wireless Network Intrusion Detection Model Based on Deep Learning
In order to effectively detect wireless network intrusion behavior, a combined wireless network intrusion detection model based on deep learning was proposed. First, a feature database was generated by feature mapping, one-hot encoding, and normalization
Hongyu Yang, Geng Qin, Li Ye
doaj +1 more source

