Search

Your search keyword '"Intrusion Detection"' showing total 859 results

Search Constraints

Start Over You searched for: Descriptor "Intrusion Detection" Remove constraint Descriptor: "Intrusion Detection" Database OAIster Remove constraint Database: OAIster
859 results on '"Intrusion Detection"'

Search Results

1. An integrated intrusion detection framework based on subspace clustering and ensemble learning

2. Tiny Twins for detecting cyber-attacks at runtime using concise Rebeca time transition system

3. Deep-IDS : A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning

4. A Review on Cyber Security and Machine Learning: Advantages, Challenges

5. A Novel IoT Intrusion Detection Model Using 2dCNN-BiLSTM

6. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

7. Long Short-Term Memory Networks for In-Vehicle Networks Intrusion Detection Using Reverse Engineered Automotive Packets

8. ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks

9. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

10. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

11. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

12. Decentralised Intrusion Detection in Multi-Access Edge Computing

13. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

14. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

15. On the Resilience of Machine Learning-Based IDS for Automotive Networks

16. Machine Learning Based Classification of IoT Traffic

17. Machine Learning Based Classification of IoT Traffic

18. Anomaly Detection Dataset for Industrial Control Systems

19. Specifications of a Simulation Framework for Virtualized Intelligent Electronic Devices in Smart Grids Covering Networking and Security Requirements

20. Machine Learning Based Classification of IoT Traffic

22. MalBoT-DRL: Malware botnet detection using deep reinforcement learning in IoT networks

23. Elastic gradient boosting decision trees under limited labels by sequential epistemic uncertainty quantification: Elastic CatBoost Uncertainty (eCBU)

24. Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA Systems

25. Hidden Markov Models for Intrusion Detection Under Background Activity

26. Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression: Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression

27. Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression: Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression

28. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

29. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

30. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

31. On the Resilience of Machine Learning-Based IDS for Automotive Networks

32. Intrusion Detection in Networks by Wasserstein Enabled Many-Objective Evolutionary Algorithms

33. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT

34. A Clustering Strategy for Enhanced FL-Based Intrusion Detection in IoT Networks

35. Cyberattack Correlation and Mitigation for Distribution Systems via Machine Learning

36. CamDec: Advancing axis P1435-LE video camera security using honeypot-based deception

37. Intrusion detection based on bidirectional long short-term memory with attention mechanism

38. A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT

39. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

40. Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection

41. Molding the Symbiosis between Human and Machine: Contributions to Anomaly Detection, Model Evaluation, and Active Learning

42. Detecting Novel Variants of Application Layer (D)DoS Attacks using Supervised

43. Digital Twin-based Intrusion Detection for Industrial Control Systems

44. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

45. Cooperative security log analysis using machine learning : Analyzing different approaches to log featurization and classification

46. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

47. Exploiting the Temporal Behavior of State Transitions for Intrusion Detection in ICS/SCADA

48. On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

49. Spatiotemporal authentication system architecture for smart campus safety

50. Smart Attack Detection for IoT Networks

Catalog

Books, media, physical & digital resources