We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle

    Active and passive intrusion are the two types of intrusion. The active intrusion attempts to modify the data and the passive intrusion observes the...

    Abdulrahman Saad Alqahtani in Wireless Personal Communications
    Article 30 January 2024
  2. Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection

    Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread...

    Chandra Prabha Kaliappan, Kanmani Palaniappan, ... Ushasukhanya Subramanian in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  3. Feature Extraction and Anomaly Detection Using Different Autoencoders for Modeling Intrusion Detection Systems

    Maintaining network security by preventing attacks is essential for a network intrusion detection system. Machine learning techniques heavily depend...

    Arrun Sivasubramanian, Mithil Devisetty, Premjith Bhavukam in Arabian Journal for Science and Engineering
    Article 17 April 2024
  4. A novel transfer extreme learning machine from multiple sources for intrusion detection

    Intrusion detection systems (IDS), as a technology to protect networks from attacks, play a pivotal role in ensuring computer system and network...

    Kunpeng Wang, **gmei Li, Weifei Wu in Peer-to-Peer Networking and Applications
    Article 17 October 2023
  5. Network Intrusion Detection Based on Explainable Artificial Intelligence

    People often use similar methods to invade network traffic, such as flood attacks and Ddos attacks. Early detection of malicious traffic usually uses...

    Yiwen Wang, Lei Xu, ... Junjie Gu in Wireless Personal Communications
    Article 30 May 2023
  6. Meta learning-based few-shot intrusion detection for 5G-enabled industrial internet

    With the formation and popularization of the 5G-enabled industrial internet, cybersecurity risks are increasing, and the limited number of attack...

    Yu Yan, Yu Yang, ... Yuheng Gu in Complex & Intelligent Systems
    Article Open access 25 March 2024
  7. Intrusion Detection System Using Machine Learning

    In recent years, the field of network security has witnessed severe advances in the development of intrusion detection systems to protect computer...
    Manasvi Dhankani, K. R. Rakesh, Amit Patadia in Advances in Data-Driven Computing and Intelligent Systems
    Conference paper 2024
  8. Providing a hybrid approach to increase the accuracy of intrusion detection systems in computer networks

    Intrusion detection is a critical obstacle in the realm of security and data mining methodologies. Consequently, researchers have extensively...

    Wei Zhao, Zhitong Zhao in Journal of Engineering and Applied Science
    Article Open access 28 May 2024
  9. Blockchain-Enabled Lightweight Intrusion Detection System for Secure MANETs

    In this study, we provide a novel method dubbed BL-IDS, which makes use of a decentralized Blockchain network to power a minimal intrusion detection...

    Article 06 January 2024
  10. Self-healing hybrid intrusion detection system: an ensemble machine learning approach

    The increasing complexity and adversity of cyber-attacks have prompted discussions in the cyber scenario for a prognosticate approach, rather than a...

    Sauharda Kushal, Bharanidharan Shanmugam, ... Suresh Thennadil in Discover Artificial Intelligence
    Article Open access 16 April 2024
  11. Enhancing intrusion detection recursive feature elimination with resampling in WSN

    With the proliferation of technologies such as the Internet of Things, Cloud computing, and Social Networking, large quantities of network traffic...

    Ashwini B. Abhale, Jayaram Reddy Avulapalli in International Journal of System Assurance Engineering and Management
    Article 19 October 2023
  12. LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive

    Controller Area Network (CAN) is increasing connectivity to the external environment for intelligent interconnection in autonomous vehicles, as well...

    Pengzhou Cheng, Lei Hua, ... Gongshen Liu in Peer-to-Peer Networking and Applications
    Article 06 June 2024
  13. A novel intrusion detection system for internet of things devices and data

    As we enter the new age of the Internet of Things (IoT) and wearable gadgets, sensors, and embedded devices are extensively used for data aggregation...

    Ajay Kaushik, Hamed Al-Raweshidy in Wireless Networks
    Article Open access 21 August 2023
  14. An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of Things

    The increasing prevalence of Internet of Things (IoT) systems has made them attractive targets for malicious actors. To address the evolving threats...

    Chahira Mahjoub, Monia Hamdi, ... Ridha Ejbali in EURASIP Journal on Wireless Communications and Networking
    Article Open access 04 May 2024
  15. A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction

    In today's internet-driven world, a multitude of attacks occurs daily, propelled by a vast user base. The effective detection of these numerous...

    B. A. Manjunatha, K. Aditya Shastry, ... Kadiri Thirupal Reddy in Soft Computing
    Article Open access 30 November 2023
  16. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks

    With the increase in cyber security attacks, organizations tend to use an intrusion detection system (IDS) based on machine learning. Through the...

    Yasmeen Alslman, Mouhammd Alkasassbeh, Mohammad Almseidin in Arabian Journal for Science and Engineering
    Article 11 October 2023
  17. Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN

    A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless devices which are deployed in a physical environment to...

    Binthiya A, Selvi Ravindran in Peer-to-Peer Networking and Applications
    Article 17 February 2024
  18. Machine learning based intrusion detection system for IoMT

    Millennials have the advantage of accessing readily available modern scientific advancements, particularly in technology. One of these technologies...

    Article 07 September 2023
  19. Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks

    Security is important for UAV networks because of the need for a cyber-secure flying air space for UAV group communication to complete the complex...

    Yingshu Wang, Jian Ding, ... Jun Zhang in Mobile Networks and Applications
    Article 07 August 2023
  20. Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection

    As cyber threats continue to evolve, ensuring network security has become increasingly critical. Deep learning-based intrusion detection systems...

    Fang Li, Hang Shen, ... **aodong Miao in Peer-to-Peer Networking and Applications
    Article 25 November 2023
Did you find what you were looking for? Share feedback.