-
1
Research and implement on the intrusion tolerant system
Published 2006-01-01Subjects: “…intrusion tolerance…”
Get full text
Article -
2
New approach to evaluate the capacity of signature-based intrusion detection systems
Published 2007-01-01Subjects: “…intrusion detection…”
Get full text
Article -
3
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
4
Representation for uncertainty trust of WSN based on lightweight-cloud
Published 2014-02-01Subjects: Get full text
Article -
5
Comparison of Intrusive Effects and Amount of Root Resorption in Maxillary Incisors Using Two Conventional Intrusion Arches and Mini-Implants
Published 2024-12-01Subjects: Get full text
Article -
6
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01Subjects: “…Intrusion detection…”
Get full text
Article -
7
What to Do When Septic Systems Are Impacted by Flooding from Storms or Groundwater Rise
Published 2023-12-01Subjects: Get full text
Article -
8
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01Subjects: “…intrusion prevention…”
Get full text
Article -
9
-
10
Breaking and entering, or a feeling of heterotopia in tourism situations
Published 2016-07-01Subjects: Get full text
Article -
11
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Published 2024-01-01Subjects: Get full text
Article -
12
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01Subjects: Get full text
Article -
13
Fuzzy intrusion detection system for MANET packet dropping attack
Published 2016-10-01Subjects: Get full text
Article -
14
Prediction and Analysis of Saltwater Intrusion in Pearl River Estuary Based on Machine Learning
Published 2025-01-01Subjects: “…saltwater intrusion…”
Get full text
Article -
15
Attack detection model based on stacking ensemble learning for Internet of vehicles
Published 2024-12-01Subjects: Get full text
Article -
16
Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system
Published 2017-01-01Subjects: Get full text
Article -
17
Research on intrusion detection based on an improved GHSOM
Published 2011-01-01Subjects: Get full text
Article -
18
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01Subjects: “…security in the system, intrusion detection system, traffic analysis.…”
Get full text
Article -
19
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01Subjects: Get full text
Article -
20
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01Subjects: Get full text
Article