-
81
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01Subjects: Get full text
Article -
82
Abnormal data filtering approach based on collective trust for WSN
Published 2014-05-01Subjects: Get full text
Article -
83
Malware detection approach based on improved SOINN
Published 2019-12-01Subjects: Get full text
Article -
84
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: Get full text
Article -
85
Groundwater and soil moisture data collected in the coastal critical zone of the Delmarva Peninsula, United StatesCUAHSI Hydroshare
Published 2025-04-01Subjects: Get full text
Article -
86
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01Subjects: Get full text
Article -
87
Effect Mechanism of the North Wind on Saltwater Intrusion in the Modaomen Channel
Published 2020-01-01Subjects: “…saltwater intrusion…”
Get full text
Article -
88
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
89
An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion
Published 2025-01-01Subjects: Get full text
Article -
90
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
91
Improved FastICA algorithm for data optimization processing in intrusion detection
Published 2016-01-01Subjects: “…intrusion detection…”
Get full text
Article -
92
Decision-level fusion model of multi-source intrusion detection alerts
Published 2011-01-01Subjects: Get full text
Article -
93
GHSOM intrusion detection based on Dempster-Shafer theory
Published 2015-11-01Subjects: Get full text
Article -
94
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01Subjects: Get full text
Article -
95
FilterFA: a multiple string matching algorithm based on specification of character set
Published 2016-12-01Subjects: “…intrusion detection…”
Get full text
Article -
96
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01Subjects: Get full text
Article -
97
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01Subjects: “…intrusion detection technology…”
Get full text
Article -
98
Cutting-Edge Intrusion Detection in IoT Networks: A Focus on Ensemble Models
Published 2025-01-01Subjects: Get full text
Article -
99
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01Subjects: Get full text
Article -
100
Detecting DNS-based covert channel on live traffic
Published 2013-05-01Subjects: Get full text
Article