Searched for: subject%3A%22Intrusion%255C+Detection%22
(1 - 20 of 28)

Pages

Explainable artificial intelligence for intrusion detection in IoT networks
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach
Learning Automata for Network Behaviour Analysis
Learning Automata for Network Behaviour Analysis
Elastic gradient boosting decision trees under limited labels by sequential epistemic uncertainty quantification
Elastic gradient boosting decision trees under limited labels by sequential epistemic uncertainty quantification: Elastic CatBoost Uncertainty (eCBU)
Specifications of a Simulation Framework for Virtualized Intelligent Electronic Devices in Smart Grids Covering Networking and Security Requirements
Specifications of a Simulation Framework for Virtualized Intelligent Electronic Devices in Smart Grids Covering Networking and Security Requirements
A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT
A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT
Anomaly based network intrusion detection for IoT attacks using deep learning technique
Anomaly based network intrusion detection for IoT attacks using deep learning technique
Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation
Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence
A fast instance reduction algorithm for intrusion detection scenarios
A fast instance reduction algorithm for intrusion detection scenarios
Ruling the Rules
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems
Measuring the quality of publicly available synthetic IDS datasets
Measuring the quality of publicly available synthetic IDS datasets: A comparative study
Adversarial Traffic Modifications for the Network Intrusion Detection Domain
Adversarial Traffic Modifications for the Network Intrusion Detection Domain: A Practical Adversarial Network Traffic Crafting Approach
A multi-measure feature selection algorithm for efficacious intrusion detection
A multi-measure feature selection algorithm for efficacious intrusion detection
A Blockchain-Based Federated Forest for SDN-Enabled In-Vehicle Network Intrusion Detection System
A Blockchain-Based Federated Forest for SDN-Enabled In-Vehicle Network Intrusion Detection System
Real-time Intrusion Detection of Cyber Physical Systems
Real-time Intrusion Detection of Cyber Physical Systems
An Unsupervised Approach for False Alarm Filtering in Rule-based NIDS
An Unsupervised Approach for False Alarm Filtering in Rule-based NIDS
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers
A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers
Last line of defence
Last line of defence: Cyber security of industrial control systems
Searched for: subject%3A%22Intrusion%255C+Detection%22
(1 - 20 of 28)

Pages