Results 31 to 40 of about 11,445 (258)
Using CLIPS to Detect Network Intrusions [PDF]
This paper shows how to build a network intrusion detection system by slightly modifying NASA’s CLIPS source code, introducing features such as single and multiple string pattern matching, certainty factors and time-stamp operators. Several Snort functions and plugins were adapted and used for packet decoding and preprocessing to provide the basic ...
Alípio, Pedro +2 more
openaire +2 more sources
Big data technology for computer intrusion detection
In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering ...
Chen Ying
doaj +1 more source
Research on Wireless Sensor Network Intrusion Detection Technology
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang +4 more
doaj +1 more source
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner.
P Roshni Mol, C Immaculate Mary
doaj +1 more source
SVM Intrusion Detection Model Based on Compressed Sampling
Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data.
Shanxiong Chen +3 more
doaj +1 more source
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques.
NATHANIEL, D., SOOSAI, A.
doaj +1 more source
Combined Wireless Network Intrusion Detection Model Based on Deep Learning
In order to effectively detect wireless network intrusion behavior, a combined wireless network intrusion detection model based on deep learning was proposed. First, a feature database was generated by feature mapping, one-hot encoding, and normalization
Hongyu Yang, Geng Qin, Li Ye
doaj +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Existing intrusion detection models generally only analyze the static characteristics of network intrusion actions,resulting in low detection rate and high false positive rate,and cannot effectively detect low-frequency attacks.Therefore,a novel ...
Binghao YAN,Guodong HAN
doaj +3 more sources
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source

