Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 81938

Страница 3 из 8194

Anomaly Electrocardiograms Automatic Detection with Unsupervised Deep Learning Methods, such as malicious intrusions into computer systems, finance and banking, health monitoring, etc. Currently, deep

Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis propose a WiFi-based approach aimed at detecting nearby aerial or terrestrial devices by performing

Detection of network attacks based on adaptive resonance theotyThe paper considers an approach to intrusion detection systems using a neural network of adaptive

Network attacks classification using Long Short-Term memory based neural networks in Software-Defined Networks of intrusion detection. © 2020 Elsevier B.V.. All rights reserved.

Architectural framework of a prototype for anomaly detection in network traffic using machine learning, the system employs the Isolation Forest algorithm for anomaly detection and provides interactive web

Neural network model for detecting network scanning attacks methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS

Using GRID for Centralized Synthesis of FPGA-based Information Security SystemsThe functioning of such signature-based information security tools as network intrusion detection

Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a

Advanced Data Recognition Technique for Real-Time Sand Monitoring Systems. The commonly used non-intrusive sand monitoring systems are based on - acoustic emission measurement techniques

Система предотвращения вторжений FortiGateВ статье представлены результаты исследования функциональности Intrusion Prevention System (IPS

Страница 3 из 8194