Results for 'intrusion detection systems'

1000+ found
Order:
  1.  20
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  16
    UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation.Arun Nagaraja, B. Uma & Rajesh Kumar Gunupudi - 2020 - Foundations of Science 25 (4):1049-1075.
    Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  95
    Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  28
    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model.Basim Mahbooba, Mohan Timilsina, Radhya Sahal & Martin Serrano - 2021 - Complexity 2021:1-11.
    Despite the growing popularity of machine learning models in the cyber-security applications ), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The previous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  10
    Improving the efficiency of intrusion detection in information systems.Bouderah Brahim, Nacer Eddine Yousfi, Bourenane Malika & Lounis Ouarda - 2022 - Journal of Intelligent Systems 31 (1):835-854.
    Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. P. Mehrotra, Sharad. Zeng, Daniel, Chen, Hsinchun. Thuraisingham, Bhavani.“A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks--A Friend Approach”. [REVIEW]S. A. Razak, S. Furnell & N. Brooke Clarke - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3975--590.
    No categories
     
    Export citation  
     
    Bookmark  
  7.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  8
    The Impact of Different System Call Representations on Intrusion Detection.Sarah Wunderlich, Markus Ring, Dieter Landes & Andreas Hotho - 2022 - Logic Journal of the IGPL 30 (2):239-251.
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related, non-continuous data like system calls of an operating system. This work focuses on five different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encodings and learning word2vec, GloVe or fastText representations of system calls. As (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  12
    Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  28
    A Hybrid Clustering Approach for Network Intrusion Detection Using Cobweb and FFT.Mrutyunjaya Panda & Manas Ranjan Patra - 2009 - Journal of Intelligent Systems 18 (3):229-246.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  17
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  8
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  26
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  13
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  45
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  91
    Why ritualized behavior? Precaution systems and action parsing in developmental, pathological and cultural rituals.Pascal Boyer & Pierre Liénard - 2006 - Behavioral and Brain Sciences 29 (6):595-613.
    Ritualized behavior, intuitively recognizable by its stereotypy, rigidity, repetition, and apparent lack of rational motivation, is found in a variety of life conditions, customs, and everyday practices: in cultural rituals, whether religious or non-religious; in many children's complicated routines; in the pathology of obsessive-compulsive disorders (OCD); in normal adults around certain stages of the life-cycle, birthing in particular. Combining evidence from evolutionary anthropology, neuropsychology and neuroimaging, we propose an explanation of ritualized behavior in terms of an evolved Precaution System geared (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   58 citations  
  18.  40
    Evolving intrusion detection rules on mobile ad hoc networks.Sevil Şen & John A. Clark - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou (eds.), Pricai 2008: Trends in Artificial Intelligence. Springer. pp. 1053--1058.
  19.  35
    The Application of the Acoustic Complexity Indices (ACI) to Ecoacoustic Event Detection and Identification (EEDI) Modeling.A. Farina, N. Pieretti, P. Salutari, E. Tognari & A. Lombardi - 2016 - Biosemiotics 9 (2):227-246.
    In programs of acoustic survey, the amount of data collected and the lack of automatic routines for their classification and interpretation can represent a serious obstacle to achieving quick results. To overcome these obstacles, we are proposing an ecosemiotic model of data mining, ecoacoustic event detection and identification, that uses a combination of the acoustic complexity indices and automatically extracts the ecoacoustic events of interest from the sound files. These events may be indicators of environmental functioning at the scale (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  20.  31
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  33
    Community perspectives on the benefits and risks of technologically enhanced communicable disease surveillance systems: a report on four community juries.Chris Degeling, Stacy M. Carter, Antoine M. van Oijen, Jeremy McAnulty, Vitali Sintchenko, Annette Braunack-Mayer, Trent Yarwood, Jane Johnson & Gwendolyn L. Gilbert - 2020 - BMC Medical Ethics 21 (1):1-14.
    Background Outbreaks of infectious disease cause serious and costly health and social problems. Two new technologies – pathogen whole genome sequencing and Big Data analytics – promise to improve our capacity to detect and control outbreaks earlier, saving lives and resources. However, routinely using these technologies to capture more detailed and specific personal information could be perceived as intrusive and a threat to privacy. Method Four community juries were convened in two demographically different Sydney municipalities and two regional cities in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  11
    Corruption Detection Systems and Skills, and Employee Retention in South African Universities.Bethuel Sibongiseni Ngcamu & Evangelos Mantzaris - 2023 - Journal of Academic Ethics 21 (3):519-539.
    The superfluous and systemic problem of fraud and corruption in South African universities has intentionally paralysed internal control measures that detect and combat corruption. This reality has been aggravated by the deployment of unskilled workers in strategic positions in universities, driving the corruption agenda and frustrating those skilled quality employees capable of operating the systems that detect and combat corruption. This article explores employees’ experience and knowledge in previously disadvantaged universities relating to operating systems that enable the (...) and prevention of fraud and corruption. This paper further attempts to assess whether these universities employ and retain knowledgeable and quality employees who can operate these systems. The qualitative multi-case study was conducted using a sample of 20 middle and senior managers, with data collected through interviews. The study generated five themes from the research findings, which appear to have allowed the corrupt practices to occur. These include, first, intentionally paralysed internal control systems and processes; second, the deliberate employment and retention of incompetent employees; third, the inconsistent application of policies and practices which favour those driving the corruption agenda; fourth, the lack of the requisite knowledge and skills; and lastly, the absence of retention and succession plans, with those who are ethical being isolated and purged from the corrupt system. This study has not been explored previously and therefore adds value to theories and realities of corruption in universities. The research also contributes by shedding light on the extent of organised and systemic corruption in South African universities, assisting decision-makers in implementing the appropriate interventions to combat corruption. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  25
    Comparison of classification techniques applied for network intrusion detection and classification.Amira Sayed A. Aziz, Sanaa El-Ola Hanafi & Aboul Ella Hassanien - 2017 - Journal of Applied Logic 24:109-118.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  15
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying network parameters during (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  20
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  17
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  32
    An intelligent fault detection system for a heat pump installation based on a geothermal heat exchanger.José Luis Casteleiro-Roca, Héctor Quintián, José Luis Calvo-Rolle, Emilio Corchado, María del Carmen Meizoso-López & Andrés Piñón-Pazos - 2016 - Journal of Applied Logic 17:36-47.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  29. An unsupervised clustering algorithm for intrusion detection.G. Yu, A. G. Ali & B. Nabil - forthcoming - Proc. Of the 16th Conference of the Canadian Society for Computational Studies of Intelligence (Ai 2003), Halifax, Nova Scotia, Canada.
    No categories
     
    Export citation  
     
    Bookmark  
  30. Topic 5-Parallel and Distributed Databases, Data Mining and Knowledge Discovery-Supporting a Real-Time Distributed Intrusion Detection Application on GATES.Qian Zhu, Liang Chen & Gagan Agrawal - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4128--360.
     
    Export citation  
     
    Bookmark   1 citation  
  31.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  5
    Evaluating the impact of different Feature as a Counter data aggregation approaches on the performance of NIDSs and their selected features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Systems for the production of plagiarists? The implications arising from the use of plagiarism detection systems in UK universities for asian learners.Niall Hayes & Lucas Introna - 2005 - Journal of Academic Ethics 3 (1):55-73.
    This paper argues that the inappropriate framing and implementation of plagiarism detection systems in UK universities can unwittingly construct international students as ‘plagiarists’. It argues that these systems are often implemented with inappropriate assumptions about plagiarism and the way in which new members of a community of practice develop the skills to become full members of that community. Drawing on the literature and some primary data it shows how expectations, norms and practices become translated and negotiated in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  34.  25
    An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning.Heng Wang, Zhenzhen Zhao, Zhiwei Guo, Zhenfeng Wang & Guangyin Xu - 2017 - Complexity:1-10.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  56
    Constituents of political cognition: Race, party politics, and the alliance detection system.David Pietraszewski, Oliver Scott Curry, Michael Bang Petersen, Leda Cosmides & John Tooby - 2015 - Cognition 140 (C):24-39.
    Research suggests that the mind contains a set of adaptations for detecting alliances: an alliance detection system, which monitors for, encodes, and stores alliance information and then modifies the activation of stored alliance categories according to how likely they will predict behavior within a particular social interaction. Previous studies have established the activation of this system when exposed to explicit competition or cooperation between individuals. In the current studies we examine if shared political opinions produce these same effects. In (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  36.  13
    Research on computer static software defect detection system based on big data technology.Rahul Neware, Jyoti Bhola, K. Arumugam, Jianxing Zhu & Zhaoxia Li - 2022 - Journal of Intelligent Systems 31 (1):1055-1064.
    To study the static software defect detection system, based on the traditional static software defect detection system design, a new static software defect detection system design based on big data technology is proposed. The proposed method can optimize the distribution of test resources and improve the quality of software products by predicting the potential defect program modules and design the software and hardware of the static software defect detection system of big data technology. It is found (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  25
    Aspects of adaptive reconfiguration in a scalable intrusion tolerant system.Stephanie Bryant & Feiyi Wang - 2003 - Complexity 9 (2):74-83.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  10
    A Prediction Method of Electromagnetic Environment Effects for UAV LiDAR Detection System.Min Huang, Dandan Liu, Liyun Ma, Jingyang Wang, Yuming Wang & Yazhou Chen - 2021 - Complexity 2021:1-14.
    With the rapid development of science and technology, UAVs have become a new type of weapon in the informatization battlefield by their advantages of low loss and zero casualty rate. In recent years, UAV navigation electromagnetic decoy and electromagnetic interference crashes have activated widespread international attention. The UAV LiDAR detection system is susceptible to electromagnetic interference in a complex electromagnetic environment, which results in inaccurate detection and causes the mission to fail. Therefore, it is very necessary to predict (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  20
    Autonomic defense: Thwarting automated attacks via real‐time feedback control.Derek Armstrong, Sam Carter, Gregory Frazier & Tiffany Frazier - 2003 - Complexity 9 (2):41-48.
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  18
    Lithium iron phosphate power cell fault detection system based on hybrid intelligent system.José Luis Casteleiro-Roca, Héctor Quintián, José Luis Calvo-Rolle, Juan-Albino Méndez-Pérez, Francisco Javier Perez-Castelo & Emilio Corchado - forthcoming - Logic Journal of the IGPL.
    Nowadays, batteries play an important role in a lot of different applications like energy storage, electro-mobility, consumer electronic and so on. All the battery types have a common factor that is their complexity, independently of its nature. Usually, the batteries have an electrochemical nature. Several different test are accomplished to check the batteries performance, and commonly, it is predictable how they work depending of their technology. The present research describes the hybrid intelligent system created to accomplish fault detection over (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  23
    Design and implementation of real-time object detection system based on single-shoot detector and OpenCV.Fazal Wahab, Inam Ullah, Anwar Shah, Rehan Ali Khan, Ahyoung Choi & Muhammad Shahid Anwar - 2022 - Frontiers in Psychology 13.
    Computer vision and human–computer interaction are essential in many technological fields. Researchers in CV are particularly interested in real-time object detection techniques, which have a wide range of applications, including inspection systems. In this study, we design and implement real-time object detection and recognition systems using the single-shoot detector algorithm and deep learning techniques with pre-trained models. The system can detect static and moving objects in real-time and recognize the object’s class. The primary goals of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  65
    An Analysis of Student Privacy Rights in the Use of Plagiarism Detection Systems.Bo Brinkman - 2013 - Science and Engineering Ethics 19 (3):1255-1266.
    Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students’ rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  16
    Design and Implementation of an Assistive Real-Time Red Lionfish Detection System for AUV/ROVs.M.-Mahdi Naddaf-Sh, Harley Myler & Hassan Zargarzadeh - 2018 - Complexity 2018:1-10.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  65
    Stephanie Bryant and Feiyi Wang, Aspects of adaptive reconfiguration in a scalable intrusion tolerant system, Complexity (2004) 9(2)74–83. [REVIEW]Stephanie Bryant & Feiyi Wang - 2004 - Complexity 9 (4):46-46.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Change detection without awareness: Do explicit reports underestimate the representation of change in the visual system?Diego Fernandez-Duque & Ian Thornton - 2000 - Visual Cognition 7 (1):323-344.
    Evidence from many different paradigms (e.g. change blindness, inattentional blindness, transsaccadic integration) indicate that observers are often very poor at reporting changes to their visual environment. Such evidence has been used to suggest that the spatio-temporal coherence needed to represent change can only occur in the presence of focused attention. In four experiments we use modified change blindness tasks to demonstrate (a) that sensitivity to change does occur in the absence of awareness, and (b) this sensitivity does not rely on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   45 citations  
  47.  18
    On the application of compression-based metrics to identifying anomalous behaviour in web traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  17
    The seahorse, the almond, and the night-mare: Elaborative encoding during sleep-paralysis hallucinations?Todd A. Girard - 2013 - Behavioral and Brain Sciences 36 (6):618-619.
    Llewellyn's proposal that rapid eye movement dreaming reflects elaborative encoding mediated by the hippocampus offers an interesting perspective for understanding hallucinations accompanying sleep paralysis. SP arises from anomalous intrusion of REM processes into waking consciousness, including threat-detection systems mediated by the amygdala. Unique aspects of SP hallucinations offer additional prospects for investigation of Llewellyn's theory of elaborative encoding.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  5
    Reputation Detection for Information Diffusion in Social Network Systems.Yifeng Zhou & Fang Yu - 2022 - Complexity 2022:1-18.
    Reputation detection in traditional distributed systems relies heavily on the factor of interaction reputation, which can be derived from direct interactions between agents through bidirectional relationships. However, in the current information diffusion in social network systems, the characteristic of the unidirectional relationship between agents and the decay property of diffusion will result in lacking direct interactions; therefore, interaction reputations will be difficult to be obtained by agents in a distributed manner. To solve this problem, a novel distributed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  12
    Concept systems and frames: Detecting and managing terminological gaps between languages.Rossella Resi - 2024 - Applied ontology 19 (1):47-71.
    This paper examines the concept of “terminological gaps” and strives to identify suitable methods for dealing with them during translation. The analysis begins with an investigation of the contended notion of gaps in terminology based on empirical examples drawn from a German-Italian terminological database specifically designed for translation purposes. Two macro categories of gaps are identified, conceptual and linguistic level gaps, which only partially correspond to previous observations in the literature. The paper uses examples to explore the advantages of ontological (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000