-
21
Research on intrusion detection based on an improved GHSOM
Published 2011-01-01Subjects: Get full text
Article -
22
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01Subjects: “…security in the system, intrusion detection system, traffic analysis.…”
Get full text
Article -
23
Management of Traumatically Intruded Permanent Incisors during an Ongoing Orthodontic Treatment
Published 2024-12-01Subjects: Get full text
Article -
24
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01Subjects: Get full text
Article -
25
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01Subjects: Get full text
Article -
26
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01Subjects: Get full text
Article -
27
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01Subjects: “…intrusion detection…”
Get full text
Article -
28
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01Subjects: “…intrusion detection…”
Get full text
Article -
29
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01Subjects: “…intrusion detection…”
Get full text
Article -
30
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01Subjects: Get full text
Article -
31
Multi-layered based network security defense system
Published 2007-01-01Subjects: “…multi-intrusion detection…”
Get full text
Article -
32
MAPPING OF SALTWATER INTRUSION AT IGBOKODA, SOUTHWESTERN, NIGERIA USING COMBINED GEOPHYSICAL AND CHEMICAL TECHNIQUES
Published 2018-03-01Subjects: Get full text
Article -
33
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
Published 2011-01-01Subjects: “…intrusion detection…”
Get full text
Article -
34
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01Subjects: Get full text
Article -
35
Network latency clustering for detector placement on macroscopical prewarning
Published 2006-01-01Subjects: “…distributed intrusion…”
Get full text
Article -
36
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01Subjects: “…Network intrusion detection…”
Get full text
Article -
37
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Published 2025-01-01Subjects: “…network intrusion detection…”
Get full text
Article -
38
Intrusion detection scheme based on neural network in vehicle network
Published 2014-11-01Subjects: Get full text
Article -
39
Effect of cut-off walls on submarine groundwater discharge in non-isothermal conditions
Published 2025-01-01Subjects: “…seawater intrusion…”
Get full text
Article -
40
Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
Published 2024-12-01Subjects: Get full text
Article