-
81
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Published 2024-01-01Subjects: Get full text
Article -
82
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01Subjects: Get full text
Article -
83
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01Subjects: Get full text
Article -
84
Intrusion detection model of random attention capsule network based on variable fusion
Published 2020-11-01Subjects: Get full text
Article -
85
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01Subjects: Get full text
Article -
86
IDS alert clustering algorithm based on chaotic particle swarm optimization
Published 2013-03-01Subjects: “…intrusion detection system…”
Get full text
Article -
87
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01Subjects: “…intrusion detection…”
Get full text
Article -
88
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01Subjects: Get full text
Article -
89
Abnormal data filtering approach based on collective trust for WSN
Published 2014-05-01Subjects: Get full text
Article -
90
Malware detection approach based on improved SOINN
Published 2019-12-01Subjects: Get full text
Article -
91
A power extraction approach with load state modification for energy disaggregation
Published 2025-01-01Subjects: “…Non-intrusive load monitoring…”
Get full text
Article -
92
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: Get full text
Article -
93
Groundwater and soil moisture data collected in the coastal critical zone of the Delmarva Peninsula, United StatesCUAHSI Hydroshare
Published 2025-04-01Subjects: Get full text
Article -
94
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01Subjects: Get full text
Article -
95
Non-intrusive implementation of a wide variety of Multiscale Finite Element Methods
Published 2023-07-01Subjects: Get full text
Article -
96
Effect Mechanism of the North Wind on Saltwater Intrusion in the Modaomen Channel
Published 2020-01-01Subjects: “…saltwater intrusion…”
Get full text
Article -
97
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
98
An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion
Published 2025-01-01Subjects: Get full text
Article -
99
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
100
Improved FastICA algorithm for data optimization processing in intrusion detection
Published 2016-01-01Subjects: “…intrusion detection…”
Get full text
Article