Search Results - Network Intrusion Detection - Memory Efficient Algorithms
-
1
Authors:
Source: ETRI Journal, Vol 47, Iss 6, Pp 1049-1060 (2025)
Subject Terms: gorilla troops optimization algorithm, internet of things, intrusion detection, long short-termmemory network, standard scaler technique, Telecommunication, TK5101-6720, Electronics, TK7800-8360
File Description: electronic resource
-
2
Authors: Luo Shan
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-19 (2025)
Subject Terms: Internet of Things, Intrusion detection system, Whale optimization algorithm, Gray wolf optimization, Cybersecurity, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
3
Authors: Kumar, Pawan
Thesis Advisors: Balakrishnan, N, Singh, Virendra
Subject Terms: Access Control (Computer Networks), Cryptography, Network Intrusion Detection System, Computer Security, Cyber-attack, Network Intrusion Detection - Regular Expression Pattern Matching, Cascaded Automata Architecture, Deterministic Finite Automata, Network Intrusion Detection - Memory Efficient Algorithms, Network Intrustion Detection System Signatures, Network Intrusion Detection Systems (NIDS), Modified Word-based NFA (M-WNFA), Network Security, Pattern Matching, Computer Science
Relation: G25266
-
4
Authors: Sreekar Shenoy, Govind
Contributors: University/Department: Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
Thesis Advisors: Tubella, Jordi, González Colás, Antonio
Source: TDX (Tesis Doctorals en Xarxa)
File Description: application/pdf
Access URL: http://hdl.handle.
net /10803/124705
https://dx.doi.org/10.5821/dissertation-2117-94979 -
5
Authors:
Source: Molecular & Cellular Biomechanics; 2024, Vol. 21 Issue 3, p1-20, 20p
-
6
Authors:
Source: Journal of Network & Systems Management. Oct2025, Vol. 33 Issue 4, p1-40. 40p.
-
7
Authors: et al.
Source: Journal of Advanced Zoology. 2024, Vol. 45 Issue 3, p801-810. 10p.
PDF Full Text -
8
Authors: et al.
Source: Egyptian Informatics Journal, Vol 31, Iss , Pp 100764- (2025)
Subject Terms: Appropriate large margin algorithm, Incremental neural network, Stochastic Weight Averaging, Online machine learning, Internet of Things, Network intrusion detection, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
9
Authors:
Source: Procedia Computer Science. 2015, Vol. 56, p292-299. 8p.
-
10
Authors: et al.
Source: International Journal on Smart Sensing & Intelligent Systems; Special issue 2017, Vol. 10, p101-122, 22p
-
11
Alternate Title: Mejora de los sistemas multiclase de detección de intrusos en red mediante la transformada de ondícula continua en el tráfico de red. (Spanish)
Authors:
Source: Data & Metadata; 2025, Vol. 4, p1-19, 19p
-
12
Authors: et al.
Source: Frontiers in Health Informatics; 2024, Vol. 13 Issue 8, p1747-1761, 15p
-
13
Authors:
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 3, p193-213, 21p
-
14
Authors: et al.
Source: IEEE Access, Vol 11, Pp 37131-37148 (2023)
Subject Terms: Convolutional neural network, deep neural networks, network intrusion detection, deep learning, two-stage model, LSTM-AE, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
15
Authors:
Source: Computation; Sep2025, Vol. 13 Issue 9, p222, 28p
-
16
Authors: et al.
Source: Ain Shams Engineering Journal, Vol 15, Iss 12, Pp 103052- (2024)
Subject Terms: Wireless sensor network (WSN), Denial of service (DoS), Intrusion detection system (IDS), Crow search algorithm, Deep LSTM algorithm, Engineering (General). Civil engineering (General), TA1-2040
File Description: electronic resource
-
17
Authors: et al.
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 4, p1304-1311, 8p
-
18
Authors:
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-17 (2025)
Subject Terms: Deep reinforcement learning, Intrusion detection system, Software-defined networking, Long short-term memory network, Particle colony-adjusted jumping teaching fishing optimization algorithm, Distributed denial of service attack detection, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
19
Authors: et al.
Source: Scientific reports [Sci Rep] 2025 Jul 01; Vol. 15 (1), pp. 22292. Date of Electronic Publication: 2025 Jul 01.
Publication Type: Journal Article
Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
-
20
Authors: et al.
Source: Computation; Sep2025, Vol. 13 Issue 9, p221, 42p
Full Text Finder
Nájsť tento článok vo Web of Science