Results 11 to 20 of about 459,551 (229)

A machine learning-based intrusion detection for detecting internet of things network attacks

open access: yesAlexandria Engineering Journal, 2022
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed   +4 more
doaj   +1 more source

Self-Powered Intelligent Human-Machine Interaction for Handwriting Recognition

open access: yesResearch, 2021
Handwritten signatures widely exist in our daily lives. The main challenge of signal recognition on handwriting is in the development of approaches to obtain information effectively.
Hang Guo   +7 more
doaj   +1 more source

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

Ensuring network security with a robust intrusion detection system using ensemble-based machine learning

open access: yesArray, 2023
Intrusion detection is a critical aspect of network security to protect computer systems from unauthorized access and attacks. The capacity of traditional intrusion detection systems (IDS) to identify unknown sophisticated threats is constrained by their
Md. Alamgir Hossain, Md. Saiful Islam
doaj   +1 more source

Objective definition of rosette shape variation using a combined computer vision and data mining approach. [PDF]

open access: yesPLoS ONE, 2014
Computer-vision based measurements of phenotypic variation have implications for crop improvement and food security because they are intrinsically objective. It should be possible therefore to use such approaches to select robust genotypes.
Anyela Camargo   +5 more
doaj   +1 more source

Behavior authentication of Web users based on machine learning

open access: yes网络与信息安全学报, 2018
According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use ...
Zenan WU, Liqin TIAN, Zhigang WANG
doaj   +3 more sources

Secure Multiparty Computation of Principal Component Analysis

open access: yesJournal of KIISE, 2015
In recent years, many research efforts have been made on privacy-preserving data mining (PPDM) in data of large volume. In this paper, we propose a PPDM solution based on principal component analysis (PCA), which can be widely used in computing correlation among sensitive data sets.
Sang-Pil Kim   +4 more
openaire   +1 more source

Network intrusion detection method based on matrix factorization of their time and frequency representations

open access: yesETRI Journal, 2020
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network.
Spiros Chountasis   +2 more
doaj   +1 more source

Anomaly based Intrusion Detection using Modified Fuzzy Clustering

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2017
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information.
B. S. Harish, S. V. Aruna Kumar
doaj   +1 more source

Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop

open access: yesSensors, 2023
With the advancement in big data and cloud computing technology, we have witnessed tremendous developments in applying intelligent techniques in network operation and management.
Dong Yang, Ze Liu, Songjie Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy