Anomaly Electrocardiograms Automatic Detection with Unsupervised Deep Learning Methods, such as malicious
intrusions into computer
systems, finance and banking, health monitoring, etc. Currently, deep
Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis propose a WiFi-based approach aimed at
detecting nearby aerial or terrestrial devices by performing
Detection of network attacks based on adaptive resonance theotyThe paper considers an approach to
intrusion detection systems using a neural network of adaptive
Architectural framework of a prototype for anomaly detection in network traffic using machine learning, the
system employs the Isolation Forest algorithm for anomaly
detection and provides interactive web
Neural network model for detecting network scanning attacks methods and approaches to scanning network ports are considered.
Intrusion detection systems (IDS
Using GRID for Centralized Synthesis of FPGA-based Information Security SystemsThe functioning of such signature-based information security tools as network
intrusion detection Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC to attackers can be avoided by using honeypot
systems combined with
Intrusion detection systems (IDSs) as a
Advanced Data Recognition Technique for Real-Time Sand Monitoring Systems. The commonly used non-
intrusive sand monitoring
systems are based on - acoustic emission measurement techniques
Система предотвращения вторжений FortiGateВ статье представлены результаты исследования функциональности
Intrusion Prevention
System (IPS