Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 4828 results
Sort by: relevance publication year

An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm

PROCEEDINGS ARTICLE published 4 June 2015 in Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research

Authors: Rinku Sen | Manojit Chattopadhyay | Nilanjan Sen

Multi-direction Edge Detection Operator

PROCEEDINGS ARTICLE published December 2015 in 2015 11th International Conference on Computational Intelligence and Security (CIS)

Authors: Pengfei Xu | Qiguang Miao | Tiange Liu | Xiaojiang Chen

Discerning flooding attack from flash crowd based on traffic patterns using entropy detection method

PROCEEDINGS ARTICLE published March 2015 in 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]

Authors: T. Swaroopa Rani | V. Sindhura | G. RamaKoteswara Rao | K. Pranathi

Monocular optical flow navigation using sparse SURF flow with multi-layer bucketing screener

PROCEEDINGS ARTICLE published July 2015 in 2015 34th Chinese Control Conference (CCC)

Authors: Chen Qian | Yan Wang | Lei Guo

Anomaly detection method using network pattern analysis of process

PROCEEDINGS ARTICLE published October 2015 in 2015 World Congress on Internet Security (WorldCIS)

Authors: Minho Han | Ikkyun Kim

Improving performance of classification intrusion detection model by Weighted extreme learning using behavior analysis of the attack

PROCEEDINGS ARTICLE published November 2015 in 2015 International Computer Science and Engineering Conference (ICSEC)

Authors: Silada Intarasothonchun | Worachai Srimuang

Web Service classification using Multi-Layer Perceptron optimized with Tabu search

PROCEEDINGS ARTICLE published June 2015 in 2015 IEEE International Advance Computing Conference (IACC)

Study on Countermeasures Using Mitigation Software against Vulnerability Attacks

PROCEEDINGS ARTICLE published October 2015 in 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)

Authors: Ryohei Koizumi | Ryoichi Sasaki

Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using Radar Measurements

PROCEEDINGS ARTICLE published September 2015 in 2015 European Intelligence and Security Informatics Conference

Authors: Francesco Papi

The scrambler attack: A robust physical layer attack on location privacy in vehicular networks

PROCEEDINGS ARTICLE published February 2015 in 2015 International Conference on Computing, Networking and Communications (ICNC)

Authors: Bastian Bloessl | Christoph Sommer | Falko Dressler | David Eckhoff

Object contour detecting using pseudo zernike moment and multi-layer perceptron

PROCEEDINGS ARTICLE published November 2015 in 2015 22nd Iranian Conference on Biomedical Engineering (ICBME)

Authors: Nasim Borzue | Karim Faez

Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models

PROCEEDINGS ARTICLE published October 2022 in 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

Authors: Thejavathy Vengappa Raja | Zoheir Ezziane | Jun He | Xiaoqi Ma | Asmau Wali-Zubai Kazaure

Implementing Physical Layer Security Using Transmitters with Constellation Shaping

PROCEEDINGS ARTICLE published August 2015 in 2015 24th International Conference on Computer Communication and Networks (ICCCN)

Authors: Paulo Montezuma | Rui Dinis

Intrusion detection system based on Multi-Layer Perceptron Neural Networks and Decision Tree

PROCEEDINGS ARTICLE published May 2015 in 2015 7th Conference on Information and Knowledge Technology (IKT)

Authors: Jamal Esmaily | Reza Moradinezhad | Jamal Ghasemi

Multi-Layer Linkage Sealing Mechanism on Solar Cell Tool

PROCEEDINGS ARTICLE published 2015 in Proceedings of the 2015 International Conference on Electromechanical Control Technology and Transportation

Authors: Huaxin Yang | Yuehui Hu | Yichuan Chen

Multi scale multi directional shear operator for personal recognition using Conjunctival vasculature

PROCEEDINGS ARTICLE published April 2015 in 2015 IEEE International Symposium on Technologies for Homeland Security (HST)

Authors: Sriram Pavan Tankasala | Plamen Doynov

Heat conduction in multi-layer circuit elements

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE SENSORS

Authors: Daniel Schumayer | Timothy C. A. Molteno

A fuzzing test for dynamic vulnerability detection on Android Binder mechanism

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE Conference on Communications and Network Security (CNS)

Replay attack detection in control systems with quantized signals

PROCEEDINGS ARTICLE published July 2015 in 2015 European Control Conference (ECC)

Authors: Kenji Kashima | Daisuke Inoue

Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison

PROCEEDINGS ARTICLE published April 2015 in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

Authors: Qi Xiong | Ying-Chang Liang | Kwok Hung Li | Yi Gong