Works matching DE "INTRUSION detection systems (Computer security)"
Results: 3205
Optimizing Feature Selection in Intrusion Detection Systems Using a Genetic Algorithm with Stochastic Universal Sampling.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1059
- By:
- Publication type:
- Article
Using deep learning model integration to build a smart railway traffic safety monitoring system.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-88830-7
- By:
- Publication type:
- Article
Retraction: Advancements in intrusion detection: A lightweight hybrid RNN-RF model.
- Published in:
- 2025
- Publication type:
- Correction Notice
A hybrid approach for intrusion detection in vehicular networks using feature selection and dimensionality reduction with optimized deep learning.
- Published in:
- PLoS ONE, 2025, v. 20, n. 2, p. 1, doi. 10.1371/journal.pone.0312752
- By:
- Publication type:
- Article
Deep Packet Inspection Model Based on Support Vector Machine for Anomaly Detection in Local Area Networks.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 2, p. 8, doi. 10.25195/ijci.v50i2.501
- By:
- Publication type:
- Article
A COMPARATIVE PERFORMANCE EVALUATION OF NETWORK INTRUSION DETECTION USING MACHINE AND DEEP LEARNING ALGORITHMS.
- Published in:
- Mathematics for Application, 2024, v. 13, n. 2, p. 1, doi. 10.13164/ma.2024.13201
- By:
- Publication type:
- Article
ARP spoofing detection using machine learning classifiers: an experimental study.
- Published in:
- Knowledge & Information Systems, 2025, v. 67, n. 1, p. 727, doi. 10.1007/s10115-024-02219-y
- By:
- Publication type:
- Article
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2025, v. 22, n. 1, p. 60, doi. 10.34028/iajit/22/1/6
- By:
- Publication type:
- Article
Research on new energy power plant network traffic anomaly detection method based on EMD.
- Published in:
- Energy Informatics, 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42162-025-00474-z
- By:
- Publication type:
- Article
HAIS-IDS: A hybrid artificial immune system model for intrusion detection in IoT.
- Published in:
- Bulletin of the Polish Academy of Sciences: Technical Sciences, 2025, v. 73, n. 1, p. 1, doi. 10.24425/bpasts.2024.152211
- By:
- Publication type:
- Article
Grey Relational Frame Prediction Method for Anomaly Detection.
- Published in:
- Journal of Grey System, 2022, v. 34, n. 1, p. 1
- By:
- Publication type:
- Article
An LSTM-based anomaly detection model for the deformation of concrete dams.
- Published in:
- Structural Health Monitoring, 2024, v. 23, n. 3, p. 1914, doi. 10.1177/14759217231199569
- By:
- Publication type:
- Article
An unsupervised online anomaly detection method for metal additive manufacturing processes via a statistical time-frequency domain algorithm.
- Published in:
- Structural Health Monitoring, 2024, v. 23, n. 3, p. 1926, doi. 10.1177/14759217231193702
- By:
- Publication type:
- Article
Review on recent advances in structural health monitoring paradigm for looseness detection in bolted assemblies.
- Published in:
- Structural Health Monitoring, 2023, v. 22, n. 6, p. 4264, doi. 10.1177/14759217231158540
- By:
- Publication type:
- Article
Dam safety assessment through data-level anomaly detection and information fusion.
- Published in:
- Structural Health Monitoring, 2023, v. 22, n. 3, p. 2002, doi. 10.1177/14759217221117478
- By:
- Publication type:
- Article
An MPPCA-based approach for anomaly detection of structures under multiple operational conditions and missing data.
- Published in:
- Structural Health Monitoring, 2023, v. 22, n. 2, p. 1069, doi. 10.1177/14759217221100708
- By:
- Publication type:
- Article
Multi-index probabilistic anomaly detection for large span bridges using Bayesian estimation and evidential reasoning.
- Published in:
- Structural Health Monitoring, 2023, v. 22, n. 2, p. 948, doi. 10.1177/14759217221092786
- By:
- Publication type:
- Article
A self-matching model for online anomaly recognition of safety monitoring data in dams.
- Published in:
- Structural Health Monitoring, 2023, v. 22, n. 1, p. 746, doi. 10.1177/14759217221074603
- By:
- Publication type:
- Article
Non-parametric empirical machine learning for short-term and long-term structural health monitoring.
- Published in:
- Structural Health Monitoring, 2022, v. 21, n. 6, p. 2700, doi. 10.1177/14759217211069842
- By:
- Publication type:
- Article
Continuous missing data imputation with incomplete dataset by generative adversarial networks–based unsupervised learning for long-term bridge health monitoring.
- Published in:
- Structural Health Monitoring, 2022, v. 21, n. 3, p. 1093, doi. 10.1177/14759217211021942
- By:
- Publication type:
- Article
Anomaly detection of structural health monitoring data using the maximum likelihood estimation-based Bayesian dynamic linear model.
- Published in:
- Structural Health Monitoring, 2021, v. 20, n. 6, p. 2936, doi. 10.1177/1475921720977020
- By:
- Publication type:
- Article
Toward data anomaly detection for automated structural health monitoring: Exploiting generative adversarial nets and autoencoders.
- Published in:
- Structural Health Monitoring, 2021, v. 20, n. 4, p. 1609, doi. 10.1177/1475921720924601
- By:
- Publication type:
- Article
Propagative broad learning for nonparametric modeling of ambient effects on structural health indicators.
- Published in:
- Structural Health Monitoring, 2021, v. 20, n. 4, p. 1409, doi. 10.1177/1475921720916923
- By:
- Publication type:
- Article
Combination of damage feature decisions with adaptive boosting for improving the detection performance of a structural health monitoring framework: Validation on an operating wind turbine.
- Published in:
- Structural Health Monitoring, 2021, v. 20, n. 2, p. 637, doi. 10.1177/1475921720909379
- By:
- Publication type:
- Article
Computer vision and deep learning–based data anomaly detection method for structural health monitoring.
- Published in:
- Structural Health Monitoring, 2019, v. 18, n. 2, p. 401, doi. 10.1177/1475921718757405
- By:
- Publication type:
- Article
1D CNN and BiSRU Based Intrusion Detection Method for Industrial Control Systems.
- Published in:
- Journal of Information Science & Engineering, 2024, v. 40, n. 1, p. 107, doi. 10.6688/JISE.202401_40(1).0007
- By:
- Publication type:
- Article
Foreword.
- Published in:
- Journal of Information Science & Engineering, 2023, v. 39, n. 6, p. 1233
- Publication type:
- Article
SADEM: An Effective Supervised Anomaly Detection Ensemble Model for Alert Account Detection.
- Published in:
- Journal of Information Science & Engineering, 2023, v. 39, n. 5, p. 1185, doi. 10.6688/JISE.202309-39(5).0011
- By:
- Publication type:
- Article
A Densely Stacked Attention Method for Cyberattack Detection.
- Published in:
- Journal of Information Science & Engineering, 2023, v. 39, n. 4, p. 935, doi. 10.6688/JISE.202307_39(4).0014
- By:
- Publication type:
- Article
IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 2, p. 361, doi. 10.6688/J1SE.201903_35(2).0007
- By:
- Publication type:
- Article
Dealing with Interleaved Event Inputs for Intrusion Detection.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 1, p. 223, doi. 10.6688/JISE.201901_35(1).0012
- By:
- Publication type:
- Article
Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 4, p. 1069, doi. 10.6688/JISE.2017.33.4.14
- By:
- Publication type:
- Article
A Multi-resolution Port Scan Detection Technique for High-speed Networks.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 5, p. 1613
- By:
- Publication type:
- Article
Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 3, p. 943
- By:
- Publication type:
- Article
A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 453
- By:
- Publication type:
- Article
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 2, p. 243
- By:
- Publication type:
- Article
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1563
- By:
- Publication type:
- Article
Optical wearable sensor based player injury detection with movement analysis using hybrid machine learning model.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 3, p. 1, doi. 10.1007/s11082-023-06077-w
- By:
- Publication type:
- Article
E-healthcare application cyber security analysis using quantum machine learning in malicious user detection.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 3, p. 1, doi. 10.1007/s11082-023-05854-x
- By:
- Publication type:
- Article
Emerging network communication for malicious node detection in wireless multimedia sensor networks.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 1, p. 1, doi. 10.1007/s11082-023-05659-y
- By:
- Publication type:
- Article
A weight optimized deep learning model for cluster based intrusion detection system.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 14, p. 1, doi. 10.1007/s11082-023-05509-x
- By:
- Publication type:
- Article
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 19, p. 26942, doi. 10.1007/s11227-024-06409-x
- By:
- Publication type:
- Article
A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 18, p. 26088, doi. 10.1007/s11227-024-06417-x
- By:
- Publication type:
- Article
A network intrusion detection system based on deep learning in the IoT.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 24520, doi. 10.1007/s11227-024-06345-w
- By:
- Publication type:
- Article
Ocean observing time-series anomaly detection based on DTW-TRSAX method.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 18679, doi. 10.1007/s11227-024-06183-w
- By:
- Publication type:
- Article
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 18325, doi. 10.1007/s11227-024-06153-2
- By:
- Publication type:
- Article
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 16301, doi. 10.1007/s11227-024-06108-7
- By:
- Publication type:
- Article
Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 16393, doi. 10.1007/s11227-024-06071-3
- By:
- Publication type:
- Article
Enhancing network intrusion detection by lifelong active online learning.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 16428, doi. 10.1007/s11227-024-06070-4
- By:
- Publication type:
- Article
Quantum particle Swarm optimized extreme learning machine for intrusion detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 14622, doi. 10.1007/s11227-024-06022-y
- By:
- Publication type:
- Article