Zobrazeno 1 - 10
of 8 613
pro vyhledávání: '"ids"'
Autor:
Sanjek, Rick, author
Publikováno v:
American Popular Music and Its Business in the Digital Age : 1985-2020, 2024.
Externí odkaz:
https://doi.org/10.1093/oso/9780190653828.003.0008
Autor:
Shanthalakshmi M, Ponmagal R S
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-21 (2024)
Abstract Smart cities have developed advanced technology that improves people’s lives. A collaboration of smart cities with autonomous vehicles shows the development towards a more advanced future. Cyber-physical system (CPS) are used blend the cyb
Externí odkaz:
https://doaj.org/article/f310c18c3a3f4c158fb16b3498271659
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-25 (2024)
Abstract The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based (DL-based) IDSes are proposed to auto-extract high-level features and eliminate the time-consum
Externí odkaz:
https://doaj.org/article/f6ca3b80bd604511ba223a8e2c8cb6d2
Publikováno v:
Jurnal Nasional Teknik Elektro, Pp 75-81 (2024)
The utilization of intrusion detection systems (IDS) can significantly enhance the security of IT infrastructure. Machine learning (ML) methods have emerged as a promising approach to improving the capabilities of IDS. The primary objective of an IDS
Externí odkaz:
https://doaj.org/article/bc08698b45414f128742c22d4b0ba289
Publikováno v:
Journal of Mechanics of Continua and Mathematical Sciences, Vol 19, Iss 7, Pp 17-27 (2024)
The integration of the Internet of Things (IoT) in medical applications into healthcare applications has enabled the remote monitoring of patients' information, facilitating timely diagnostics as required. The technology of the Internet of Medical Th
Externí odkaz:
https://doaj.org/article/d8e0e90d6b8c4417a045111a6f0c658d
Autor:
Shahad Altamimi, Qasem Abu Al-Haija
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-37 (2024)
Abstract Intrusion Detection Systems (IDSs) are crucial for safeguarding modern IoT communication networks against cyberattacks. IDSs must exhibit exceptional performance, low false positive rates, and significant flexibility in constructing attack p
Externí odkaz:
https://doaj.org/article/25d2e55ccaa146c3aeabdf65575c09fe
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 50, Iss 1, Pp 46-53 (2024)
This investigation aims to explore previous research on the implementation of feature selection in intrusion detection. Feature selection has demonstrated its ability to enhance or sustain comparable classification accuracy levels for intrusion detec
Externí odkaz:
https://doaj.org/article/9cb44347d71a47479e58bec3c6035a3f
Publikováno v:
Journal of Intelligent Systems, Vol 33, Iss 1, Pp 7-11 (2024)
Machine learning (ML) and deep learning (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems. This study presents a systematic review of the utilization of ML, DL, optimization algorithms
Externí odkaz:
https://doaj.org/article/6031783ff98b410ca4d01126c0f0f780
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-22 (2024)
Abstract Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks have become increasingly important in today's world. Cloud service providers, including AWS,
Externí odkaz:
https://doaj.org/article/07179c96a977409da86610cc75e0f49a