Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,809 matches
- 2024
- Fatima Al-Quayed, Zulfiqar Ahmad, Mamoona Humayun:
A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0. IEEE Access 12: 34800-34819 (2024) - Mohammed S. Alshehri, Oumaima Saidani, Fatma S. Alrayes, Saadullah Farooq Abbasi, Jawad Ahmad:
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access 12: 45762-45772 (2024) - Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, Nikola Ivkovic, Mario Konecki:
A Novel Intrusion Detection System Based on Artificial Neural Network and Genetic Algorithm With a New Dimensionality Reduction Technique for UAV Communication. IEEE Access 12: 4925-4937 (2024) - Wei Dai, Xinhui Li, Wenxin Ji, Sicheng He:
Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model. IEEE Access 12: 53099-53111 (2024) - Kan He, Wei Zhang, Xuejun Zong, Lian Lian:
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification. IEEE Access 12: 44335-44350 (2024) - Tingyao Jiang, Xiaobo Fu, Min Wang:
BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer. IEEE Access 12: 54191-54201 (2024) - Halima Sadia, Saima Farhan, Yasin Ul Haq, Rabia Sana, Tariq Mahmood, Saeed Ali Omer Bahaj, Amjad Rehman Khan:
Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach. IEEE Access 12: 52565-52582 (2024) - Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. IEEE Access 12: 23096-23121 (2024) - Gaurav Tripathi, Vishal Krishna Singh, Varun Sharma, Majithia Vivek Vinodbhai:
Weighted Feature Selection for Machine Learning Based Accurate Intrusion Detection in Communication Networks. IEEE Access 12: 20973-20982 (2024) - Saqib Ali, Qianmu Li, Abdullah Yousafzai:
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey. Ad Hoc Networks 152: 103320 (2024) - Shigen Shen, Chenpeng Cai, Zhenwei Li, Yizhou Shen, Guowen Wu, Shui Yu:
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks. Appl. Soft Comput. 150: 111080 (2024) - Srinivas Byatarayanapura Venkataswamy, Indrajit Mandal, Seetharam Keshavarao:
Virtual Machine Migration-Based Intrusion Detection System in Cloud Environment Using Deep Recurrent Neural Network. Cybern. Syst. 55(2): 450-470 (2024) - Neeraj Kumar, Upendra Kumar:
Artificial intelligence for classification and regression tree based feature selection method for network intrusion detection system in various telecommunication technologies. Comput. Intell. 40(1) (2024) - Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed Fakhrudeen:
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security. Comput. Networks 239: 110140 (2024) - R. Reka, R. Karthick, R. Saravana Ram, Gurkirpal Singh:
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET. Comput. Secur. 136: 103526 (2024) - Ameni Chetouane, Kamel Karoui:
Risk based intrusion detection system in software defined networking. Concurr. Comput. Pract. Exp. 36(9) (2024) - Prabhjot Kaur, Shalini Batra, Prashant Singh Rana:
Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. Concurr. Comput. Pract. Exp. 36(1) (2024) - S. Siva Shankar, Bui Thanh Hung, Prasun Chakrabarti, Tulika Chakrabarti, Gayatri Parasa:
A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system. Educ. Inf. Technol. 29(4): 3859-3883 (2024) - Mathappan Nivaashini, Suganya Elavarasan, Sountharrajan Sehar, M. Prabu, Durga Prasad Bavirisetti:
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. EURASIP J. Inf. Secur. 2024(1): 8 (2024) - Bhawana Sharma, Lokesh Sharma, Chhagan Lal, Satyabrata Roy:
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Syst. Appl. 238(Part A): 121751 (2024) - Gianmarco Baldini, Kandeepan Sithamparanathan:
Intrusion Detection System for MIL-STD-1553 Based on Convolutional Neural Networks With Binary Images and Adaptive Quantization. IEEE Netw. Lett. 6(1): 50-54 (2024) - Hongjiao Wu:
Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm. Int. J. Distributed Sens. Networks 2024: 1-14 (2024) - H. Asad, S. Adhikari, Ilir Gashi:
A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. Int. J. Inf. Sec. 23(2): 1331-1346 (2024) - Qi Zhou, Chun Shi:
A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning. Int. J. Semantic Web Inf. Syst. 20(1): 1-28 (2024) - Max Schrötter, Andreas Niemann, Bettina Schnor:
A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks. Inf. 15(3): 164 (2024) - Shoujian Yu, Rong Zhai, Yizhou Shen, Guowen Wu, Hong Zhang, Shui Yu, Shigen Shen:
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things. IEEE Internet Things J. 11(7): 12536-12550 (2024) - Md. Alamin Talukder, Md. Manowarul Islam, Md. Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni:
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. J. Big Data 11(1): 33 (2024) - Zhenyue Long, Huiru Yan, Guiquan Shen, Xiaolu Zhang, Haoyang He, Long Cheng:
A Transformer-based network intrusion detection approach for cloud security. J. Cloud Comput. 13(1): 5 (2024) - Jiawei Du, Kai Yang:
NIDS-FLGDP: Network Intrusion Detection Algorithm Based on Gaussian Differential Privacy Federated Learning. J. Circuits Syst. Comput. 33(3) (2024) - Yongsheng Deng:
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network. J. Cyber Secur. Mobil. 13(2): 327-348 (2024)
skipping 1,779 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 13:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint