Results 21 to 30 of about 145,910 (140)
Secure Multiparty Computation of Principal Component Analysis
In recent years, many research efforts have been made on privacy-preserving data mining (PPDM) in data of large volume. In this paper, we propose a PPDM solution based on principal component analysis (PCA), which can be widely used in computing correlation among sensitive data sets.
Myeong-Seon Gil+4 more
openaire +2 more sources
Anomaly based Intrusion Detection using Modified Fuzzy Clustering
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information.
B.S. Harish, S.V.A. Kumar
doaj +1 more source
Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop
With the advancement in big data and cloud computing technology, we have witnessed tremendous developments in applying intelligent techniques in network operation and management.
Dong Yang, Ze Liu, Songjie Wei
doaj +1 more source
UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY [PDF]
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks.
Rahul Kumar Sharma +3 more
doaj +1 more source
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data [PDF]
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and ...
Naglaa Ibrahim, Hana Usman
doaj +1 more source
Fuzzy based intrusion detection system in MANET
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj
IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi+3 more
doaj +1 more source
Computer Security in the Real World
Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but it's hard to even find network
B. Lampson
semanticscholar +1 more source
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada+2 more
doaj +1 more source
A machine learning-based intrusion detection for detecting internet of things network attacks
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed+4 more
doaj