-
121
Hinterland decline, resource rents, and resource wages: A critique of the theory of an Intrusive Rentier Syndrome
Published 2022-01-01Subjects: Get full text
Article -
122
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: Get full text
Article -
123
-
124
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
125
HashTrie:a space-efficient multiple string matching algorithm
Published 2015-10-01Subjects: “…intrusion detection…”
Get full text
Article -
126
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01Subjects: “…intrusion detection system…”
Get full text
Article -
127
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration
Published 2025-01-01Subjects: Get full text
Article -
128
Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion
Published 2025-01-01Subjects: “…saltwater intrusion…”
Get full text
Article -
129
Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches
Published 2025-01-01Subjects: Get full text
Article -
130
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
131
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01Subjects: “…intrusion detection…”
Get full text
Article -
132
SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things
Published 2024-12-01Subjects: Get full text
Article -
133
Research on intrusion detection based on network events and deep protocol analysis
Published 2011-01-01Subjects: “…intrusion detection…”
Get full text
Article -
134
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article -
135
An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks
Published 2025-01-01Subjects: Get full text
Article -
136
Non-intrusive load monitoring based on time-enhanced multidimensional feature visualization
Published 2025-02-01Subjects: “…Non-intrusive load monitoring…”
Get full text
Article -
137
MAGNETITE-ILMENITE-SPINEL INTERGROWTHS IN AMPHIBOLE GABBRO OF THE SEREBRYANSKY KAMEN INTRUSION, CENTRAL URALS
Published 2022-12-01Subjects: Get full text
Article -
138
Railway safety monitoring algorithm based on distributed optical fiber vibration sensor
Published 2020-09-01Subjects: Get full text
Article -
139
A survey on intrusion detection system in IoT networks
Published 2025-12-01Subjects: Get full text
Article -
140
Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game
Published 2018-09-01Subjects: Get full text
Article