نتایج جستجو برای: anomaly based detection

تعداد نتایج: 3344676  

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

Journal: :International Journal of Distributed Sensor Networks 2015

Journal: :Data Mining and Knowledge Discovery 2014

Journal: :Electronics 2023

Anomaly detection across critical infrastructures is not only a key step towards detecting threats but also gives early warnings of the likelihood potential cyber-attacks, faults, or infrastructure failures. Owing to heterogeneity and complexity cybersecurity field, several anomaly algorithms have been suggested in recent past based on literature; however, there still exists little no research ...

Journal: :CoRR 2013
Saravanan Kumarasamy B. Hemalatha P. Hashini

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are a...

Journal: :The Open Automation and Control Systems Journal 2015

Journal: :The International FLAIRS Conference Proceedings 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید