Results 21 to 30 of about 1,098,399 (202)

Anomaly based Intrusion Detection using Modified Fuzzy Clustering

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2017
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information.
B.S. Harish, S.V.A. Kumar
doaj   +1 more source

Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop

open access: yesSensors, 2023
With the advancement in big data and cloud computing technology, we have witnessed tremendous developments in applying intelligent techniques in network operation and management.
Dong Yang, Ze Liu, Songjie Wei
doaj   +1 more source

A Review of Automated Image Understanding within 3D Baggage Computed Tomography Security Screening [PDF]

open access: yes, 2015
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints.
Breckon, T.P., Mouton, A.
core   +2 more sources

Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and ...
Naglaa Ibrahim, Hana Usman
doaj   +1 more source

Scalable and Privacy-Preserving Federated Principal Component Analysis [PDF]

open access: yes, 2023
Principal component analysis (PCA) is an essential algorithm for dimensionality reduction in many data science domains. We address the problem of performing a federated PCA on private data distributed among multiple data providers while ensuring data confidentiality.
arxiv   +1 more source

A Logic for Constraint-based Security Protocol Analysis [PDF]

open access: yes, 2006
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties.
Corin, R.J., Etalle, S., Saptawijaya, A.
core   +14 more sources

UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY [PDF]

open access: yesProceedings on Engineering Sciences
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks.
Rahul Kumar Sharma   +3 more
doaj   +1 more source

Fuzzy based intrusion detection system in MANET

open access: yesMeasurement: Sensors, 2023
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj  

IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism

open access: yesJournal of Big Data, 2021
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi   +3 more
doaj   +1 more source

Effective And Efficient Approach for Detecting Outliers [PDF]

open access: yes, 2014
Now a days in machine learning research anomaly detection is the main topic. Anomaly detection is the process of identifying unusual behavior. It is widely used in data mining, for example, medical informatics, computer vision, computer security, sensor ...
, M.Sowmya, Tanuja A.Krishna Mohan
core   +2 more sources

Home - About - Disclaimer - Privacy