咨询与建议

限定检索结果

文献类型

  • 76 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 82 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 81 篇 工学
    • 52 篇 计算机科学与技术...
    • 30 篇 网络空间安全
    • 26 篇 软件工程
    • 23 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 公安技术
  • 23 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 82 篇 intrusion detect...
  • 21 篇 machine learning
  • 12 篇 internet of thin...
  • 11 篇 deep learning
  • 9 篇 security
  • 9 篇 network security
  • 6 篇 anomaly detectio...
  • 6 篇 deep neural netw...
  • 6 篇 feature selectio...
  • 5 篇 classification
  • 5 篇 cloud computing
  • 5 篇 convolutional ne...
  • 4 篇 cyber security
  • 3 篇 snort
  • 3 篇 attacks
  • 3 篇 iot
  • 3 篇 cybersecurity
  • 3 篇 blockchain
  • 3 篇 cyberattacks
  • 3 篇 internet of vehi...

机构

  • 2 篇 information tech...
  • 2 篇 department of co...
  • 2 篇 information syst...
  • 2 篇 department of co...
  • 2 篇 燕山大学
  • 1 篇 chengdu universi...
  • 1 篇 computer science...
  • 1 篇 department of in...
  • 1 篇 international sc...
  • 1 篇 department of co...
  • 1 篇 mathematics depa...
  • 1 篇 faculty of busin...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of ec...
  • 1 篇 department of el...
  • 1 篇 jiangsu electric...
  • 1 篇 department of co...
  • 1 篇 college of compu...

作者

  • 2 篇 ouail mjahed
  • 2 篇 王新生
  • 2 篇 turke althobaiti
  • 2 篇 fatma s.alrayes
  • 2 篇 ansam khraisat
  • 2 篇 soukaina mjahed
  • 2 篇 mahmoud ragab
  • 2 篇 yousef sanjalawe
  • 2 篇 salah el hadaj
  • 2 篇 el mahdi el guar...
  • 2 篇 abdur rehman
  • 2 篇 muhammad adnan k...
  • 2 篇 mohammed zakaria...
  • 1 篇 abdullah s.al-ma...
  • 1 篇 jie yin
  • 1 篇 yihe zhang
  • 1 篇 mohamed hadi hab...
  • 1 篇 abu sarwar zaman...
  • 1 篇 m.reji
  • 1 篇 shailendra mishr...

语言

  • 78 篇 英文
  • 4 篇 中文
检索条件"主题词=Intrusion detection system"
82 条 记 录,以下是51-60 订阅
Energy Aware Secure Cyber-Physical systems with Clustered Wireless Sensor Networks
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 5499-5513页
作者: Masoud Alajmi Mohamed K.Nour Siwar Ben Haj Hassine Mimouna Abdullah Alkhonaini Manar Ahmed Hamza Ishfaq Yaseen Abu Sarwar Zamani Mohammed Rizwanullah Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer Science College of Computer and Information SciencesPrince Sultan UniversitySaudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical *** greatly interrelated and united characteristics of CPS resulti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
***:Hybrid Deep Learning for Enhancing IoT Network intrusion detection
收藏 引用
Computers, Materials & Continua 2021年 第12期69卷 3945-3966页
作者: Ziadoon K.Maseer Robiah Yusof Salama A.Mostafa Nazrulazhar Bahaman Omar Musa Bander Ali Saleh Al-rimy Faculty of Information and Communication Technology Universiti Teknikal MalaysiaMelaka76100Malaysia Center of Intelligent and Autonomous systems Faculty of Computer Science and Information TechnologyUniversiti Tun Hussein Onn MalaysiaJohor86400Malaysia Faculty of Business and Technology UNITAR International UniversitySelangor47301Malaysia School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaJohor81310Malaysia
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly detection
收藏 引用
Computers, Materials & Continua 2021年 第2期66卷 2217-2227页
作者: Lewis Nkenyereye Bayu Adhi Tama Sunghoon Lim Department of Computer and Information Security Sejong UniversitySeoul05006Korea Data Science Group Institute for Basic Science(IBS)Daejeon34126Korea Department of Industrial Engineering Ulsan National Institute of Science and TechnologyUlsan44919Korea
An anomaly-based intrusion detection system(A-IDS)provides a critical aspect in a modern computing infrastructure since new types of attacks can be *** prevalently utilizes several machine learning algorithms(ML)for d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack detection
收藏 引用
China Communications 2020年 第5期17卷 151-167页
作者: Liangchen Chen Shu Gao Baoxu Liu Zhigang Lu Zhengwei Jiang School of Computer Science and Technology Wuhan University of TechnologyWuhan 430063China Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Applied Technology China University of Labor RelationsBeijing 100048China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the foc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
DDoS Attack detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3571-3588页
作者: Yousef Sanjalawe Turke Althobaiti Cybersecurity Department Faculty of Information TechnologyAmerican University of Madaba(AUM)Amman11821Jordan Computer Science Department PY CollageNorthern Border University(NBU)9280 NBUAr’arSaudi Arabia Computer Science Department Faculty of ScienceNorthern Border University(NBU)9280 NBUAr’arSaudi Arabia Remote Sensing Northern Border University(NBU) 9280 NBUAr’arSaudi Arabia
intrusion detection system(IDS)in the cloud Computing(CC)environment has received paramount interest over the last few *** the latest approaches,Deep Learning(DL)-based IDS methods allow the discovery of attacks with ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved Dragonfly Optimizer for intrusion detection Using Deep Clustering CNN-PSO Classifier
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 5949-5965页
作者: K.S.Bhuvaneshwari K.Venkatachalam S.Hubalovsky P.Trojovsky P.Prabu Department of Computer Sceince and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering CHRIST(Deemed to be University)Bangalore560074India Department of Applied Cybernetics Faculty of ScienceUniversity of Hradec KrálovéHradec Králové50003Czech Republic Department of Mathematics Faculty of ScienceUniversity of Hradec KrálovéHradec Králové50003Czech Republic Department of Computer Sceince CHRIST(Deemed to be University)Bangalore560074India
With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and *** on the characteristics of these intruders,many resear... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IoT-CDS:Internet of Things Cyberattack Detecting system Based on Deep Learning Models
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 4265-4283页
作者: Monir Abdullah Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha61922Saudi Arabia
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhance intrusion detection in Computer Networks Based on Deep Extreme Learning Machine
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 467-480页
作者: Muhammad Adnan Khan Abdur Rehman Khalid Masood Khan Mohammed A.Al Ghamdi Sultan H.Almotiri Department of Computer Science Lahore Garrison UniversityLahore54792Pakistan School of Computer Science NCBA&ELahore54000Pakistan Computer Science Department Umm Al-Qura UniversityMakkah City715Saudi Arabia
Networks provide a significant function in everyday life,and cybersecurity therefore developed a critical field of *** intrusion detection system(IDS)becoming an essential information protection strategy that tracks t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing Internet of Things intrusion detection Using Artificial Intelligence
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1-23页
作者: Shachar Bar P.W.C.Prasad Md Shohel Sayeed School of Computing MathematicsCharles Sturt UniversityBathurstNSW 2795Australia International School Duy Tan UniversityDa Nang550000Vietnam Faculty of Information Science and Technology Multimedia UniversityMelaka75450Malaysia
Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate *** aim of intrusion detection systems(IDS)is to pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect intrusion in Various Datasets
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 265-298页
作者: Ouail Mjahed Salah El Hadaj El Mahdi El Guarmah Soukaina Mjahed Faculty of Sciences and Technology Department of Computer SciencesCadi Ayyad UniversityMarrakech40000Morocco Mathematics and Informatics Department Royal Air SchoolMarrakech40000Morocco
Due to the increasing number of cyber-attacks,the necessity to develop efficient intrusion detection systems(IDS)is more imperative than *** IDS research,the most effectively used methodology is based on supervised Ne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论