Works matching DE "INTRUSION detection systems (Computer security)"
Results: 3248
Comparison of four machine learning algorithms for a pre-impact fall detection system.
- Published in:
- Medical & Biological Engineering & Computing, 2023, v. 61, n. 8, p. 1961, doi. 10.1007/s11517-023-02853-8
- By:
- Publication type:
- Article
Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review.
- Published in:
- International Journal of Information Technology & Decision Making, 2023, v. 22, n. 1, p. 589, doi. 10.1142/S021962202230004X
- By:
- Publication type:
- Article
Validación de la caracterización estadística del tráfico de red de un servidor web de un campus universitario como mecanismo de un sistema de detección de intrusos.
- Published in:
- Ingeniería y Desarrollo, 2014, v. 32, n. 1, p. 64
- By:
- Publication type:
- Article
Machine learning in adversarial environments.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
Anomaly detection in additive manufacturing processes using supervised classification with imbalanced sensor data based on generative adversarial network.
- Published in:
- Journal of Intelligent Manufacturing, 2024, v. 35, n. 5, p. 2387, doi. 10.1007/s10845-023-02163-8
- By:
- Publication type:
- Article
Weakly supervised anomaly detection with multi-level contextual modeling.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 4, p. 2153, doi. 10.1007/s00530-023-01093-y
- By:
- Publication type:
- Article
Dual-branch network with memory for video anomaly detection.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 1, p. 247, doi. 10.1007/s00530-022-00991-x
- By:
- Publication type:
- Article
Predicting skeleton trajectories using a Skeleton-Transformer for video anomaly detection.
- Published in:
- Multimedia Systems, 2022, v. 28, n. 4, p. 1481, doi. 10.1007/s00530-022-00915-9
- By:
- Publication type:
- Article
Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 2, p. 663, doi. 10.1007/s11277-018-6042-5
- By:
- Publication type:
- Article
HIoTPOT: Surveillance on IoT Devices against Recent Threats.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- By:
- Publication type:
- Article
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 4, p. 2029, doi. 10.1007/s11277-018-5804-4
- By:
- Publication type:
- Article
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1689, doi. 10.1007/s11277-018-5662-0
- By:
- Publication type:
- Article
Intrusion Detection System Against Colluding Misbehavior in MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 2, p. 491, doi. 10.1007/s11277-017-5094-2
- By:
- Publication type:
- Article
Entropy-Based Anomaly Detection in a Network.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1487, doi. 10.1007/s11277-018-5288-2
- By:
- Publication type:
- Article
A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 1853, doi. 10.1007/s11277-017-4949-x
- By:
- Publication type:
- Article
Intrusion Detection at International Borders and Large Military Barracks with Multi-sink Wireless Sensor Networks: An Energy Efficient Solution.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 1, p. 1083, doi. 10.1007/s11277-017-4909-5
- By:
- Publication type:
- Article
Research on Semantic Gap Problem of Virtual Machine.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5983, doi. 10.1007/s11277-017-4823-x
- By:
- Publication type:
- Article
A Neural Network-Based Learning Algorithm for Intrusion Detection Systems.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 3097, doi. 10.1007/s11277-017-4663-8
- By:
- Publication type:
- Article
Deployment of Wireless Intrusion Detection Systems to Provide the Most Possible Coverage in Wireless Sensor Networks Without Infrastructures.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3965, doi. 10.1007/s11277-017-4363-4
- By:
- Publication type:
- Article
Performance Study of 802.11w for Preventing DoS Attacks on Wireless Local Area Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1031, doi. 10.1007/s11277-016-3812-9
- By:
- Publication type:
- Article
Energy and Delay Efficient Dynamic Cluster Formation Using Improved Ant Colony Optimization Algorithm in EAACK MANETs.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1531, doi. 10.1007/s11277-016-3864-x
- By:
- Publication type:
- Article
A Decoy Framework to Protect Server from Wireless Network Worms.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1965, doi. 10.1007/s11277-016-3298-5
- By:
- Publication type:
- Article
An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1993, doi. 10.1007/s11277-016-3349-y
- By:
- Publication type:
- Article
Weighted Clustering Trust Model for Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2203, doi. 10.1007/s11277-016-3371-0
- By:
- Publication type:
- Article
Profile and Back Off Based Distributed NIDS in Cloud.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2879, doi. 10.1007/s11277-016-3753-3
- By:
- Publication type:
- Article
Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 1799, doi. 10.1007/s11277-016-3712-z
- By:
- Publication type:
- Article
Performance Comparison and Detection Analysis in Snort and Suricata Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 2, p. 241, doi. 10.1007/s11277-016-3209-9
- By:
- Publication type:
- Article
A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1211, doi. 10.1007/s11277-016-3386-6
- By:
- Publication type:
- Article
DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 457, doi. 10.1007/s11277-015-3022-x
- By:
- Publication type:
- Article
A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 831, doi. 10.1007/s11277-016-3229-5
- By:
- Publication type:
- Article
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 847, doi. 10.1007/s11277-016-3231-y
- By:
- Publication type:
- Article
Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 861, doi. 10.1007/s11277-016-3233-9
- By:
- Publication type:
- Article
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 687, doi. 10.1007/s11277-016-3302-0
- By:
- Publication type:
- Article
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 207, doi. 10.1007/s11277-015-2734-2
- By:
- Publication type:
- Article
Security Enhancement in Distributed Networks Using Link-Based Mapping Scheme for Network Intrusion Detection with Enhanced Bloom Filter.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 821, doi. 10.1007/s11277-015-2662-1
- By:
- Publication type:
- Article
DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 1, p. 1, doi. 10.1007/s11277-015-2327-0
- By:
- Publication type:
- Article
Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 4, p. 2595, doi. 10.1007/s11277-014-1745-8
- By:
- Publication type:
- Article
mDFA: A Memory Efficient DFA-Based Pattern Matching Engine on FPGA.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 4, p. 1833, doi. 10.1007/s11277-014-2047-x
- By:
- Publication type:
- Article
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 4, p. 1377, doi. 10.1007/s11277-012-0528-3
- By:
- Publication type:
- Article
A Composite Privacy Leakage Indicator.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 511, doi. 10.1007/s11277-011-0383-7
- By:
- Publication type:
- Article
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems.
- Published in:
- Wireless Personal Communications, 2011, v. 60, n. 4, p. 725, doi. 10.1007/s11277-010-9971-1
- By:
- Publication type:
- Article
Self-healing hybrid intrusion detection system: an ensemble machine learning approach.
- Published in:
- Discover Artificial Intelligence, 2024, v. 4, n. 1, p. 1, doi. 10.1007/s44163-024-00120-9
- By:
- Publication type:
- Article
Hyperspectral anomaly detection based on the weakly supervised robust autoencoder.
- Published in:
- Remote Sensing for Natural Resources, 2023, v. 35, n. 2, p. 167, doi. 10.6046/zrzyyg.2022093
- By:
- Publication type:
- Article
An Analysis of Intrusion Detection Classification using Supervised Machine Learning Algorithms on NSL-KDD Dataset.
- Published in:
- Journal of Computing Research & Innovation, 2022, v. 7, n. 1, p. 124, doi. 10.24191/jcrinn.v7i1.274
- By:
- Publication type:
- Article
A Comparative Study of Support Vector Machine and C4.5 Classifiers on Network Intrusion Data.
- Published in:
- African Journal of Computing & ICT, 2020, v. 13, n. 2, p. 43
- By:
- Publication type:
- Article
DEEP LEARNING-BASED INTRUSION DETECTION SYSTEMS: A COMPREHENSIVE SURVEY OF FOUR MAIN FIELDS OF CYBER SECURITY.
- Published in:
- Journal of Mahani Mathematical Research Center, 2023, v. 12, n. 2, p. 289, doi. 10.22103/jmmr.2022.19961.1305
- By:
- Publication type:
- Article
Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method.
- Published in:
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 4, p. 287, doi. 10.32604/jcs.2023.042486
- By:
- Publication type:
- Article
基于天空地一体化监测的周界防范系统设计及应用示范.
- Published in:
- Railway Signalling & Communication Engineering, 2023, v. 20, n. 5, p. 32, doi. 10.3969/j.issn.1673-4440.2023.05.007
- By:
- Publication type:
- Article
AN ARCHITECTURAL FRAMEWORK FOR ANT LION OPTIMIZATION-BASED FEATURE SELECTION TECHNIQUE FOR CLOUD INTRUSION DETECTION SYSTEM USING BAYESIAN CLASSIFIER.
- Published in:
- i-Manager's Journal On Cloud Computing, 2018, v. 5, n. 2, p. 36, doi. 10.26634/jcc.5.2.15691
- By:
- Publication type:
- Article
Replace "Air Gap" Cybersecurity With a Multibarrier Approach.
- Published in:
- Journal: American Water Works Association, 2022, v. 114, n. 6, p. 67, doi. 10.1002/awwa.1944
- By:
- Publication type:
- Article