Works matching DE "INTRUSION detection systems (Computer security)"
Results: 3264
An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network.
- Published in:
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2296
- By:
- Publication type:
- Article
TabNet‐SFO: An Intrusion Detection Model for Smart Water Management in Smart Cities.
- Published in:
- International Journal of Intelligent Systems, 2025, v. 2025, n. 1, p. 1, doi. 10.1155/int/6281847
- By:
- Publication type:
- Article
Research on a DBSCAN-IForest Optimisation-Based Anomaly Detection Algorithm for Underwater Terrain Data.
- Published in:
- Water (20734441), 2025, v. 17, n. 5, p. 626, doi. 10.3390/w17050626
- By:
- Publication type:
- Article
Implementation of EWMA Algorithm in the Analysis of Security Attacks.
- Published in:
- Journal of Engineering & Smart Systems, 2025, v. 13, n. 1, p. 1, doi. 10.21541/apjess.1541802
- By:
- Publication type:
- Article
Combination of Machine Learning Techniques Using Weighted Majority Voting for Intrusion Detection in IoT.
- Published in:
- International Journal of Information & Communication Technology Research (2251-6107), 2024, v. 16, n. 4, p. 20
- By:
- Publication type:
- Article
Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4389, doi. 10.32604/cmc.2025.060357
- By:
- Publication type:
- Article
A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4181, doi. 10.32604/cmc.2025.058822
- By:
- Publication type:
- Article
Hybrid DNN-BiLSTM-aided intrusion detection and trust-clustering and routing-based intrusion prevention system in VANET.
- Published in:
- Journal of Control & Decision, 2025, v. 12, n. 2, p. 209, doi. 10.1080/23307706.2023.2212684
- By:
- Publication type:
- Article
Enhanced Cyber Threat Detection System Leveraging Machine Learning Using Data Augmentation.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 218, doi. 10.14569/ijacsa.2025.0160223
- By:
- Publication type:
- Article
Mitigating Adversarial Reconnaissance in IoT Anomaly Detection Systems: A Moving Target Defense Approach based on Reinforcement Learning.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.6574
- By:
- Publication type:
- Article
Author Correction: Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering.
- Published in:
- 2025
- By:
- Publication type:
- Correction Notice
Exploiting Anomalies with Data Mining Techniques to Enhance Cloud Security.
- Published in:
- Mathematical Modelling of Engineering Problems, 2025, v. 12, n. 2, p. 636, doi. 10.18280/mmep.120227
- By:
- Publication type:
- Article
Levy Flight Strategy-based Tasmanian Devil's Optimization and Autoencoder Approach for Intrusion Detection in Cloud Computing.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2025, v. 18, n. 2, p. 548, doi. 10.22266/ijies2025.0331.40
- By:
- Publication type:
- Article
Modeling intrusion detection systems using swarm intelligence.
- Published in:
- International Journal of Research in Business & Social Science, 2025, v. 14, n. 1, p. 222, doi. 10.20525/ijrbs.v14i1.3582
- By:
- Publication type:
- Article
산업제어 시스템에서의 머신러닝 및 딥러닝 기반 이상탐지.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2025, v. 29, n. 2, p. 247, doi. 10.6109/jkiice.2025.29.2.247
- By:
- Publication type:
- Article
Intrusion detection system model: a white-box decision tree with feature selection optimization.
- Published in:
- Neural Computing & Applications, 2025, v. 37, n. 7, p. 5655, doi. 10.1007/s00521-024-10942-4
- By:
- Publication type:
- Article
Making a Real-Time IoT Network Intrusion-Detection System (INIDS) Using a Realistic BoT–IoT Dataset with Multiple Machine-Learning Classifiers.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2043, doi. 10.3390/app15042043
- By:
- Publication type:
- Article
Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1903, doi. 10.3390/app15041903
- By:
- Publication type:
- Article
Adaptive Semi-Supervised Algorithm for Intrusion Detection and Unknown Attack Identification.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1709, doi. 10.3390/app15041709
- By:
- Publication type:
- Article
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 93, doi. 10.3390/fi17020093
- By:
- Publication type:
- Article
Cost-Efficient Hybrid Filter-Based Parameter Selection Scheme for Intrusion Detection System in IoT.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 726, doi. 10.3390/electronics14040726
- By:
- Publication type:
- Article
Shallow Learning-Based Intrusion Detection System for In-Vehicle Network: ASIC Implementation.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 683, doi. 10.3390/electronics14040683
- By:
- Publication type:
- Article
An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment.
- Published in:
- International Journal of Computational Intelligence & Applications, 2025, v. 24, n. 1, p. 1, doi. 10.1142/S1469026824500330
- By:
- Publication type:
- Article
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting.
- Published in:
- Scientific Data, 2025, v. 12, n. 1, p. 1, doi. 10.1038/s41597-025-04603-x
- By:
- Publication type:
- Article
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1039, doi. 10.3390/s25041039
- By:
- Publication type:
- Article
CylinDeRS: A Benchmark Visual Dataset for Robust Gas Cylinder Detection and Attribute Classification in Real-World Scenes.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1016, doi. 10.3390/s25041016
- By:
- Publication type:
- Article
Intrusion Detection using Continuous Time Bayesian Networks.
- Published in:
- Journal of Artificial Intelligence Research, 2010, v. 39, p. 745
- By:
- Publication type:
- Article
CVS-FLN: a novel IoT-IDS model based on metaheuristic feature selection and neural network classification model.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86557, doi. 10.1007/s11042-024-19617-7
- By:
- Publication type:
- Article
Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 84331, doi. 10.1007/s11042-024-19066-2
- By:
- Publication type:
- Article
Channel based approach via faster dual prediction network for video anomaly detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 79281, doi. 10.1007/s11042-024-18707-w
- By:
- Publication type:
- Article
Intrusion detection using KK-RF and balanced Gini - Entropy approach.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 77219, doi. 10.1007/s11042-024-18170-7
- By:
- Publication type:
- Article
Fuzzy K-Means with M-KMP: a security framework in pyspark environment for intrusion detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 73841, doi. 10.1007/s11042-024-18180-5
- By:
- Publication type:
- Article
IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 28, p. 71559, doi. 10.1007/s11042-024-18289-7
- By:
- Publication type:
- Article
An optimized intrusion detection model for wireless sensor networks based on MLP-CatBoost algorithm.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 25, p. 66725, doi. 10.1007/s11042-023-18034-6
- By:
- Publication type:
- Article
Intelligent anomaly detection for dynamic high-frequency sensor data of road underground structure.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 62287, doi. 10.1007/s11042-023-16645-7
- By:
- Publication type:
- Article
Special issue: Multimedia data analysis for smart city environment safety: Editorial article: Embarking on a safer tomorrow through advanced multimedia analysis.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61491, doi. 10.1007/s11042-024-19354-x
- By:
- Publication type:
- Article
2-layer classification model with correlated common feature selection for intrusion detection system in networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61213, doi. 10.1007/s11042-023-17781-w
- By:
- Publication type:
- Article
Toward an intrusion detection model for IoT-based smart environments.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 62159, doi. 10.1007/s11042-023-16436-0
- By:
- Publication type:
- Article
A novel optimized parametric hyperbolic tangent swish activation function for 1D-CNN: application of sensor-based human activity recognition and anomaly detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61789, doi. 10.1007/s11042-023-15766-3
- By:
- Publication type:
- Article
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 59887, doi. 10.1007/s11042-023-17886-2
- By:
- Publication type:
- Article
AudioGuard: Speech Recognition System Robust against Optimized Audio Adversarial Examples.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 20, p. 57943, doi. 10.1007/s11042-023-15961-2
- By:
- Publication type:
- Article
Federated transfer learning for intrusion detection system in industrial iot 4.0.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 57913, doi. 10.1007/s11042-024-18379-6
- By:
- Publication type:
- Article
Staked deep ensemble model for intruder behaviour detection and classification in cloud.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 57861, doi. 10.1007/s11042-023-17677-9
- By:
- Publication type:
- Article
Multimedia datasets for anomaly detection: a review.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 56785, doi. 10.1007/s11042-023-17425-z
- By:
- Publication type:
- Article
PA2Dnet based ensemble classifier for the detection of crowd anomaly detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 18, p. 53635, doi. 10.1007/s11042-023-17627-5
- By:
- Publication type:
- Article
Crowd anomaly detection and localization via deep convolutional model with improved spatio temporal textures.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 18, p. 55053, doi. 10.1007/s11042-023-17375-6
- By:
- Publication type:
- Article
Intrusion detection in cyber-physical system using rsa blockchain technology.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 48119, doi. 10.1007/s11042-023-17576-z
- By:
- Publication type:
- Article
Semi-supervised anomaly detection in video surveillance by inpainting.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 47677, doi. 10.1007/s11042-023-17294-6
- By:
- Publication type:
- Article
An efficient federated learning based intrusion detection system using LS<sup>2</sup>DNN with PBKA based lightweight privacy preservation in cloud server.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 44685, doi. 10.1007/s11042-023-17401-7
- By:
- Publication type:
- Article
Memory enhancement method based on Skip-GANomaly for anomaly detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 19501, doi. 10.1007/s11042-023-16317-6
- By:
- Publication type:
- Article