Výsledky vyhledávání - "Intrusion Detection System"
-
1
Autoři: a další
Zdroj: IEEE Access. 13:191037-191064
Témata: Cybersecurity, Federated Learning, Internet of Things, Intrusion Detection System, IoT Dataset
Popis souboru: electronic
-
2
Autoři: a další
Zdroj: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1428-1441
Témata: Computer Science - Networking and Internet Architecture, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, rechtvaardigheid en sterke instellingen, SDG 16 - Peace, Computer Science - Cryptography and Security, SDG 16 – Vrede, Security Operations Center (SOC), Network Intrusion Detection Rules, Network Intrusion Detection System (NIDS), Cryptography and Security (cs.CR), Justice and Strong Institutions
Přístupová URL adresa: http://arxiv.org/abs/2501.09808
-
3
Autoři: a další
Zdroj: Neurocomputing. 623
Témata: AI, Artificial intelligence, Generative adversarial network, Web security, Network security, Attack obfuscation, Intrusion detection system
Popis souboru: electronic
-
4
Autoři: a další
Zdroj: IEEE Access. 12:63584-63597
Témata: Internet of Things, Long short term memory, Mathematical models, Intrusion detection, Logic gates, Recurrent neural networks, Real-time systems, Network security, Deep learning, intrusion-detection system (IDS), Internet of Things (IoT), LSTM, response mechanism, intrusion detection rate
Popis souboru: print
-
5
Autoři: a další
Zdroj: IEEE Transactions on Intelligent Transportation Systems. 26:11957-11966
-
6
Autoři: a další
Zdroj: 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). :16-29
Témata: Network Security Alerts, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, rechtvaardigheid en sterke instellingen, SDG 16 - Peace, Intrusion Detection Ruleset Tuning, SDG 16 – Vrede, Cryptography and Security, Justice and Strong Institutions, Machine Learning (cs.LG), Machine Learning, Alert Reduction, Networking and Internet Architecture, Security Operations Center (SOC), Network Intrusion Detection Rules, Network Intrusion Detection System (NIDS), Cryptography and Security (cs.CR)
-
7
Autoři:
Zdroj: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1818-1820
-
8
Autoři: a další
Zdroj: IEEE journal of biomedical and health informatics. 27(2):722-731
Témata: Medical services, Computational modeling, Intrusion detection, Training, Cloud computing, Medical diagnostic imaging, Servers, Dew computing, federated learning, internet of medical things (IoMT), intrusion detection system (IDS), machine learning
Popis souboru: electronic
-
9
Autoři: a další
Zdroj: International Journal of Applied Engineering and Management Letters. :108-119
-
10
Autoři: a další
Zdroj: Alexandria Engineering Journal, Vol 125, Iss, Pp 424-440 (2025)
Témata: Internet of things, Behavioral detection, Intrusion detection system, Machine learning, SB detection, Smart grid, TA1-2040, Engineering (General). Civil engineering (General)
Přístupová URL adresa: https://doaj.org/article/700c891d20d041e0b862559cad9f880b
-
11
Autoři: a další
Zdroj: VFAST Transactions on Software Engineering. 13:01-12
Popis souboru: application/pdf
Přístupová URL adresa: https://hdl.handle.net/11697/268759
https://doi.org/10.21015/vtse.v13i2.2116 -
12
Autoři: a další
Zdroj: Alexandria Engineering Journal, Vol 120, Iss, Pp 378-390 (2025)
Témata: IoT, Energy efficiency, Routing protocol (RPL), Malicious node detection, Low-power lossy networks (LLN), Trust-based intrusion detection system (TIDSRPL), TA1-2040, Engineering (General). Civil engineering (General)
Přístupová URL adresa: https://doaj.org/article/c3a9467b661e40e69df19d40d662ddf8
-
13
Autoři: a další
Zdroj: World Journal of Advanced Research and Reviews. 26:1210-1219
-
14
Autoři:
Zdroj: ICT Express, Vol 11, Iss 2, Pp 358-363 (2025)
Témata: Intrusion detection system, Adversarial attack, Anomaly detection, Variational autoencoder, Information technology, Feature impact, T58.5-58.64
Přístupová URL adresa: https://doaj.org/article/a95d02b4bbfa4b02aca72b4d2cbc1a1e
-
15
Autoři:
Zdroj: IEEE Open Journal of the Communications Society, Vol 6, Pp 1170-1189 (2025)
Témata: Machine Learning, host-based intrusion detection system, machine learning, information security, Information Security, Intrusion detection system, Telecommunication, TK5101-6720, Host-based Intrusion Detection System, Transportation and communications, Intrusion Detection System, HE1-9990
-
16
Autoři: a další
Zdroj: IEEE Open Journal of the Communications Society, Vol 6, Pp 4689-4717 (2025)
Témata: Generative AI (GenAI), Generative Adversarial Network (GAN), Systematic Literature Review (SLR), systematic literature review (SLR), intrusion detection system (IDS), Telecommunication, TK5101-6720, Intrusion Detection System (IDS), generative adversarial network (GAN), Transportation and communications, Internet of Things (IoT), HE1-9990
-
17
Autoři: a další
Zdroj: Tehnicki vjesnik - Technical Gazette. 32
Témata: Blockchain, Deep learning, Intrusion Detection System (IDS), Quantum Chameleon Swarm Optimizer (QCSO), Internet of Things (IoT)
Popis souboru: application/pdf
Přístupová URL adresa: https://hrcak.srce.hr/335063
https://doi.org/10.17559/tv-20241130002158 -
18
Autoři: a další
Zdroj: Nusantara of Engineering (NOE); Vol. 8 No. 02 (2025): Volume 8 Nomor 2-2025; 361 – 369
Nusantara of Engineering (NOE); Vol 8 No 02 (2025): Volume 8 Nomor 2-2025; 361 – 369Témata: Deteksi Anomali, Hybrid Ensemble, Keamanan Siber, Serangan Siber, Network Intrusion Detection Sistem, Anomaly Detection, Cyber Attack, Cyber Security, Hybrid Ensemble, Network Intrusion Detection System
Popis souboru: application/pdf
Přístupová URL adresa: https://ojs.unpkediri.ac.id/index.php/noe/article/view/25617
-
19
Autoři: a další
Zdroj: Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi); Vol 9 No 5 (2025): October 2025 (issue in progress); 1030-1037
Témata: machine learning, electrical substations, intrusion detection system, stacking ensemble learning
Popis souboru: application/pdf
Přístupová URL adresa: http://jurnal.iaii.or.id/index.php/RESTI/article/view/6502
-
20
Zdroj: Science-based technologies; Vol. 67 No. 3 (2025); 295-308
Наукоемкие технологии; Том 67 № 3 (2025); 295-308
Наукоємні технології; Том 67 № 3 (2025); 295-308Témata: кібератака, J48, критична інфраструктура, Наївний Баєс, cyber resilience, PART, JRip, MLP, IBK, система виявлення вторгнень, Naive Bayes, critical infrastructure, cyberattack, bayesian network, intrusion detection system, баєсівська мережа, критична інфраструктура, класифікатор, класифікатор, classifier
Popis souboru: application/pdf
Přístupová URL adresa: https://jrnl.nau.edu.ua/index.php/SBT/article/view/20347
Full Text Finder
Nájsť tento článok vo Web of Science