-
21
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01Subjects: Get full text
Article -
22
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01Subjects: “…intrusion detection…”
Get full text
Article -
23
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01Subjects: “…intrusion detection…”
Get full text
Article -
24
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01Subjects: “…intrusion detection…”
Get full text
Article -
25
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01Subjects: Get full text
Article -
26
Multi-layered based network security defense system
Published 2007-01-01Subjects: “…multi-intrusion detection…”
Get full text
Article -
27
MAPPING OF SALTWATER INTRUSION AT IGBOKODA, SOUTHWESTERN, NIGERIA USING COMBINED GEOPHYSICAL AND CHEMICAL TECHNIQUES
Published 2018-03-01Subjects: Get full text
Article -
28
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
Published 2011-01-01Subjects: “…intrusion detection…”
Get full text
Article -
29
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01Subjects: Get full text
Article -
30
Network latency clustering for detector placement on macroscopical prewarning
Published 2006-01-01Subjects: “…distributed intrusion…”
Get full text
Article -
31
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01Subjects: “…Network intrusion detection…”
Get full text
Article -
32
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Published 2025-01-01Subjects: “…network intrusion detection…”
Get full text
Article -
33
Intrusion detection scheme based on neural network in vehicle network
Published 2014-11-01Subjects: Get full text
Article -
34
Effect of cut-off walls on submarine groundwater discharge in non-isothermal conditions
Published 2025-01-01Subjects: “…seawater intrusion…”
Get full text
Article -
35
Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
Published 2024-12-01Subjects: Get full text
Article -
36
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Published 2025-01-01Subjects: “…Intrusion detection system…”
Get full text
Article -
37
Design and implementation of an intrusion-tolerant application server middleware
Published 2009-01-01Subjects: “…intrusion tolerance…”
Get full text
Article -
38
Research on intrusion detection of industrial control system
Published 2017-02-01Subjects: Get full text
Article -
39
Insight on intrusion behavior of compacted bentonite with accessory-mineral ring: a modelling approach
Published 2025-01-01Subjects: Get full text
Article -
40
Intrusion detection method based on machine learning
Published 2006-01-01Subjects: Get full text
Article