Robuta

https://www.preprints.org/manuscript/201610.0092
An existing power grid is going through a massive transformation. Smart grid technology is a radical approach for improvisation in prevailing power grid....
wireless sensor networksmart grid communicationscyber attacksbasedintrusion
https://openreview.net/forum?id=Jz4mfIpFvs&referrer=%5Bthe%20profile%20of%20Yi%20Zhao%5D(%2Fprofile%3Fid%3D~Yi_Zhao10)
Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) to detect malicious traffic. To expand the usage...
federated learningdefensegradientleakagebased
https://www.shadowtap.com/index.php
Shadow Tap is a network intrusion detection system that combines hardware and software features to keep data, devices and network applications safe.
network intrusion detectionsystemshadowtap
https://arxiv.org/abs/2008.03297
Abstract page for arXiv paper 2008.03297: Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
machine learning frameworkmulti stageoptimizednetwork
https://www.avast.com/c-b-what-is-an-intrusion-detection-system
Discover how Intrusion Detection Systems protect your network from threats. Explore their benefits, functionality & types of IDS.
intrusion detection systemnetwork securityids
https://scirp.org/journal/paperinformation?paperid=136719
Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a...
network securityensemble learningoptimizingvianexus
https://zenodo.org/records/12166145
Abstract: -As cyber threats continue to evolve in sophistication and diversity, the need for robust Intrusion Detection Systems (IDS) becomes paramount to...
intrusion detection systemsecurenetworkusingmodel
https://deepai.org/publication/bs-gat-behavior-similarity-based-graph-attention-network-for-network-intrusion-detection
04/07/23 - With the development of the Internet of Things (IoT), network intrusion detection is becoming more complex and extensive. It is es...
graph attention networkbsgatbehaviorsimilarity
https://nmap.org/book/firewall-ids-packet-forgery.html
intrusion detection systemspacketforgeryfirewallnmap
https://www.helpnetsecurity.com/2003/01/24/network-intrusion-detection-3e/
What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things...
network intrusion detectionhelpsecurity
https://www.securityinfowatch.com/cybersecurity/information-security/news/10594816/integrated-network-intrusion-detection
Pub. Number EP 1470691 Appl. Data EP 03737553 2003 01 24 Applicant INTEL CORPORATION Inventor(s) YADAV, Satyendra Title: INTEGRATED NETWORK INTRUSION DETECTION...
network intrusion detectionsecurity infointegratedwatch
https://www.inderscience.com/info/inarticle.php?artid=123843
Inderscience is a global company, a dynamic leading independent journal publisher disseminates the latest research across the broad fields of science,...
intrusion detection systemnetwork securityarticlecomputerusing
https://www.atlantis-press.com/journals/ijcis/25868734
Conventional Network intrusion detection system (NIDS) mostly uses individual classification techniques, such system fails to provide the best possible attack...
network intrusion detectionstagehybridclassificationtechnique