-
101
Study and implementation of integrated network security monitoring system
Published 2003-01-01Subjects: “…intrusion detection system(IDS)…”
Get full text
Article -
102
Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature
Published 2024-02-01Subjects: “…intrusion detection…”
Get full text
Article -
103
Feature selection algorithm based on improved particle swarm joint taboo search
Published 2018-12-01Subjects: “…intrusion detection…”
Get full text
Article -
104
Effects of feature selection and normalization on network intrusion detection
Published 2025-03-01Subjects: Get full text
Article -
105
Study on Drainage of Pavement Layers and Improvement Strategies: Case Study
Published 2023-02-01Subjects: Get full text
Article -
106
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
107
Influence of magma intrusion and contact distance onthermal effects of low-temperature oxidation processes in coal
Published 2024-12-01Subjects: “…magma intrusion…”
Get full text
Article -
108
Container intrusion detection method based on host system call frequency
Published 2021-08-01Subjects: Get full text
Article -
109
Automatic generating regular expression signatures for real network worms
Published 2013-03-01Subjects: Get full text
Article -
110
Research on a dynamic self-learning efficient intrusion detection model
Published 2007-01-01Subjects: Get full text
Article -
111
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: Get full text
Article -
112
-
113
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
114
HashTrie:a space-efficient multiple string matching algorithm
Published 2015-10-01Subjects: “…intrusion detection…”
Get full text
Article -
115
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01Subjects: “…intrusion detection system…”
Get full text
Article -
116
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration
Published 2025-01-01Subjects: Get full text
Article -
117
Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion
Published 2025-01-01Subjects: “…saltwater intrusion…”
Get full text
Article -
118
Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches
Published 2025-01-01Subjects: Get full text
Article -
119
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
120
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01Subjects: “…intrusion detection…”
Get full text
Article