Search

Your search keyword '"Intrusion Detection"' showing total 1,174 results

Search Constraints

Start Over You searched for: Descriptor "Intrusion Detection" Remove constraint Descriptor: "Intrusion Detection" Topic intrusion detection system Remove constraint Topic: intrusion detection system
1,174 results on '"Intrusion Detection"'

Search Results

1. Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection.

2. Network Intrusion Detection Using Neural Network Techniques

3. Development of a Malicious Network Traffic Intrusion Detection System Using Deep Learning.

4. Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions.

5. Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.

6. A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System.

7. Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big data.

8. Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN.

9. An Efficient Hybrid IDS Deployment Architecture for Multi-Hop Clustered Wireless Sensor Networks.

10. Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.

12. Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

13. Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning.

14. Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems.

16. Application of Artificial Immune System Algorithms for Intrusion Detection

18. Projects

23. A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion Detection

24. Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning

27. A Systematic Review of Intrusion Detection using Hidden Markov Models: Approaches, Applications, and Challenges

28. Reconfigurable FPGA-Based K-Means/K-Modes Architecture for Network Intrusion Detection.

29. ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection.

34. Community-Based Collaborative Intrusion Detection

37. Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems

41. Cyber-risk Management

42. Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting

43. VisRAID: Visualizing Remote Access for Intrusion Detection

46. Cognition and Technology

49. Optimizing Network Energy Consumption through Intrusion Prevention Systems

50. Introduction

Catalog

Books, media, physical & digital resources