Works matching DE "ELECTRONIC alarm systems"
Results: 80
Development of an Enhanced Obstacle Detection System Using Arduino Mega 2560.
- Published in:
- African Journal of Computing & ICT, 2021, v. 14, n. 2, p. 1
- By:
- Publication type:
- Article
Iot Network Intrusion Alarming System Using Bat Algorithm & Neural Network.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 4845
- By:
- Publication type:
- Article
Sistema de detección de caídas en personas utilizando vídeo vigilancia.
- Published in:
- INGENIARE - Revista Chilena de Ingeniería, 2020, v. 28, n. 4, p. 684
- By:
- Publication type:
- Article
Universal input display has transmitter and alarm features.
- Published in:
- Chemical Engineering, 2020, v. 127, n. 6, p. 21
- By:
- Publication type:
- Article
New security elements in biometric systems and systems I&HAS.
- Published in:
- Agronomy Research, 2016, v. 14, n. 2, p. 372
- By:
- Publication type:
- Article
Security methods for livestock buildings including assessment aspects.
- Published in:
- Agronomy Research, 2015, v. 13, n. 1, p. 231
- By:
- Publication type:
- Article
An Expert System-based Site Security Officer.
- Published in:
- Journal of Computing & Information Technology, 2007, v. 15, n. 3, p. 227, doi. 10.2498/cit.1000961
- By:
- Publication type:
- Article
Multi-level and Secured Agent-based Intrusion Detection System.
- Published in:
- Journal of Computing & Information Technology, 2006, v. 14, n. 3, p. 217, doi. 10.2498/cit.2006.03.05
- By:
- Publication type:
- Article
The use of artificial intelligence based techniques for intrusion detection: a review.
- Published in:
- Artificial Intelligence Review, 2010, v. 34, n. 4, p. 369, doi. 10.1007/s10462-010-9179-5
- By:
- Publication type:
- Article
Por qué el "Carpfishing" o "Grandes Peces" es diferente.
- Published in:
- Montes, 2021, n. 144, p. 54
- By:
- Publication type:
- Article
Disaster Preparedness Plan and Response Strategy as a Panacea for Effective Information Resources Preservation in University Libraries in North East, Nigeria.
- Published in:
- Library Philosophy & Practice, 2023, p. 1
- By:
- Publication type:
- Article
A WSN-Based Intrusion Alarm System to Improve Safety in Road Work Zones.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/7048141
- By:
- Publication type:
- Article
Mobile alarms aid pill compliance.
- Published in:
- 2004
- Publication type:
- Journal Article
Personal alarm will track staff whereabouts.
- Published in:
- 2004
- Publication type:
- Journal Article
An Efficient Framework for Network Intrusion Detection.
- Published in:
- Computer Science & Telecommunications, 2010, v. 24, n. 1, p. 32
- By:
- Publication type:
- Article
Co-opting the Body of the Identified Other: The Hysterization of Otherness in Relation to Self.
- Published in:
- Psychoanalytic Review, 2019, v. 106, n. 1, p. 49, doi. 10.1521/prev.2019.106.1.49
- By:
- Publication type:
- Article
First-order versus high-order stochastic models for computer intrusion detection.
- Published in:
- Quality & Reliability Engineering International, 2002, v. 18, n. 3, p. 243, doi. 10.1002/qre.478
- By:
- Publication type:
- Article
Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.
- Published in:
- Quality & Reliability Engineering International, 2002, v. 18, n. 3, p. 231, doi. 10.1002/qre.477
- By:
- Publication type:
- Article
A Facile Liquid Alloy Wetting Enhancing Strategy on Super‐Hydrophobic Lotus Leaves for Plant‐Hybrid System Implementation.
- Published in:
- Advanced Materials Interfaces, 2022, v. 9, n. 17, p. 1, doi. 10.1002/admi.202200516
- By:
- Publication type:
- Article
Alarm System for EAST Poloidal Field Power Supply.
- Published in:
- Fusion Science & Technology, 2019, v. 75, n. 1, p. 81, doi. 10.1080/15361055.2018.1506625
- By:
- Publication type:
- Article
Topical Issues in Venous Thromboembolism.
- Published in:
- Drugs, 2010, v. 70, p. 11, doi. 10.2165/1158582-S0-000000000-00000
- By:
- Publication type:
- Article
Automatic Fault Detection and Diagnostics and Hierarchical Fault Suppression in ASHRAE RP-1455.
- Published in:
- ASHRAE Transactions, 2017, v. 123, n. Part 2, p. 101
- By:
- Publication type:
- Article
The Issue of Evaluating the Effectiveness of Miniature Safety Fuses as Anti-Damage Systems.
- Published in:
- Energies (19961073), 2022, v. 15, n. 11, p. 4013, doi. 10.3390/en15114013
- By:
- Publication type:
- Article
SEMI-SUPERVISED DYNAMIC CLASSIFICATION FOR INTRUSION DETECTION.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 2, p. 139, doi. 10.1142/S0218194010004669
- By:
- Publication type:
- Article
Critical Study of Supervised Learning Techniques in Predicting Attacks.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 1, p. 22, doi. 10.1080/19393550903551231
- By:
- Publication type:
- Article
A Component-Based Framework for Visualization of Intrusion Detection Events.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 2, p. 95, doi. 10.1080/19393550802039791
- By:
- Publication type:
- Article
ALARMS PROVE THEIR WORTH.
- Published in:
- Nursing Standard, 2010, v. 24, n. 39, p. 11, doi. 10.7748/ns.24.39.11.s16
- Publication type:
- Article
Interview with Robert Granzow.
- Published in:
- 2008
- By:
- Publication type:
- Interview
ONLINE INTRUSION BEHAVIORS: SEQUENCES AND TIME INTERVALS.
- Published in:
- Social Behavior & Personality: an international journal, 2010, v. 38, n. 10, p. 1307, doi. 10.2224/sbp.2010.38.10.1307
- By:
- Publication type:
- Article
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2009, v. 9, n. 8, p. 5989, doi. 10.3390/s90805989
- By:
- Publication type:
- Article
Can you hear me now?
- Published in:
- Science Scope, 2013, v. 36, n. 9, p. 84, doi. 10.2505/4/ss13_036_09_84
- By:
- Publication type:
- Article
A supervised clustering algorithm for computer intrusion detection.
- Published in:
- Knowledge & Information Systems, 2005, v. 8, n. 4, p. 498, doi. 10.1007/s10115-005-0195-8
- By:
- Publication type:
- Article
Using artificial anomalies to detect unknown and known network intrusions.
- Published in:
- Knowledge & Information Systems, 2004, v. 6, n. 5, p. 507, doi. 10.1007/s10115-003-0132-7
- By:
- Publication type:
- Article
IDSIC: an intrusion detection system with identification capability.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 3, p. 185, doi. 10.1007/s10207-007-0024-z
- By:
- Publication type:
- Article
RVFL-Based Optical Fiber Intrusion Signal Recognition With Multi-Level Wavelet Decomposition as Feature.
- Published in:
- Photonic Sensors, 2018, v. 8, n. 3, p. 234, doi. 10.1007/s13320-018-0496-7
- By:
- Publication type:
- Article
Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS.
- Published in:
- Photonic Sensors, 2018, v. 8, n. 3, p. 220, doi. 10.1007/s13320-018-0486-9
- By:
- Publication type:
- Article
Method for Evaluating the Effectiveness of Electrical Circuit Protection with Miniature Fuse-Links.
- Published in:
- Energies (19961073), 2023, v. 16, n. 2, p. 960, doi. 10.3390/en16020960
- By:
- Publication type:
- Article
Selected Issues Associated with the Operational and Power Supply Reliability of Fire Alarm Systems.
- Published in:
- Energies (19961073), 2022, v. 15, n. 22, p. 8409, doi. 10.3390/en15228409
- By:
- Publication type:
- Article
Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis.
- Published in:
- Neural Computing & Applications, 2019, v. 31, n. 11, p. 7755, doi. 10.1007/s00521-018-3550-x
- By:
- Publication type:
- Article
An alarming look at process plants.
- Published in:
- TCE: The Chemical Engineer, 2011, n. 844, p. 68
- By:
- Publication type:
- Article
INTRUSION DETECTION SYSTEM BASED ON SPECKLE PATTERN ANALYSIS.
- Published in:
- Experimental Techniques, 2005, v. 29, n. 1, p. 27, doi. 10.1111/j.1747-1567.2005.tb00200.x
- By:
- Publication type:
- Article
Security shopping.
- Published in:
- Journal of Property Management, 2007, v. 72, n. 4, p. 14
- By:
- Publication type:
- Article
Real-Time Autonomous System for Structural and Environmental Monitoring of Dynamic Events.
- Published in:
- Electronics (2079-9292), 2018, v. 7, n. 12, p. 420, doi. 10.3390/electronics7120420
- By:
- Publication type:
- Article
Detecting New Forms of Network Intrusion Using Genetic Programming.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 475, doi. 10.1111/j.0824-7935.2004.00247.x
- By:
- Publication type:
- Article
Design of an Interactive Nuclear Security Physical Training Model.
- Published in:
- Journal of Physical Security, 2015, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
SOME ACHIEVEMENTS CONCERNING SECURITY SYSTEMS OF PREMISES.
- Published in:
- Annals of the University of Petrosani Electrical Engineering, 2023, v. 25, p. 75
- By:
- Publication type:
- Article
Do Not Ignore Them.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents.
- Published in:
- Journal of Network & Systems Management, 2004, v. 12, n. 1, p. 95, doi. 10.1023/B:JONS.0000015700.02134.1c
- By:
- Publication type:
- Article
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks.
- Published in:
- Journal of Network & Systems Management, 2004, v. 12, n. 1, p. 73, doi. 10.1023/B:JONS.0000015699.50210.e3
- By:
- Publication type:
- Article
Detecting Network Attacks in the Internet via Statistical Network Traffic Normality Prediction.
- Published in:
- Journal of Network & Systems Management, 2004, v. 12, n. 1, p. 51, doi. 10.1023/B:JONS.0000015698.32353.61
- By:
- Publication type:
- Article