Results 31 to 40 of about 11,445 (258)

Using CLIPS to Detect Network Intrusions [PDF]

open access: yes, 2003
This paper shows how to build a network intrusion detection system by slightly modifying NASA’s CLIPS source code, introducing features such as single and multiple string pattern matching, certainty factors and time-stamp operators. Several Snort functions and plugins were adapted and used for packet decoding and preprocessing to provide the basic ...
Alípio, Pedro   +2 more
openaire   +2 more sources

Big data technology for computer intrusion detection

open access: yesOpen Computer Science, 2023
In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering ...
Chen Ying
doaj   +1 more source

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC

open access: yesICTACT Journal on Communication Technology, 2022
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner.
P Roshni Mol, C Immaculate Mary
doaj   +1 more source

SVM Intrusion Detection Model Based on Compressed Sampling

open access: yesJournal of Electrical and Computer Engineering, 2016
Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data.
Shanxiong Chen   +3 more
doaj   +1 more source

A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks

open access: yesAdvances in Electrical and Computer Engineering, 2023
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques.
NATHANIEL, D., SOOSAI, A.
doaj   +1 more source

Combined Wireless Network Intrusion Detection Model Based on Deep Learning

open access: yesIEEE Access, 2019
In order to effectively detect wireless network intrusion behavior, a combined wireless network intrusion detection model based on deep learning was proposed. First, a feature database was generated by feature mapping, one-hot encoding, and normalization
Hongyu Yang, Geng Qin, Li Ye
doaj   +1 more source

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm

open access: yes网络与信息安全学报, 2018
Existing intrusion detection models generally only analyze the static characteristics of network intrusion actions,resulting in low detection rate and high false positive rate,and cannot effectively detect low-frequency attacks.Therefore,a novel ...
Binghao YAN,Guodong HAN
doaj   +3 more sources

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy