Journal articles on the topic 'Ids and devices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ids and devices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Naz, Naila, Muazzam A. Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, and Jawad Ahmad. "Ensemble learning-based IDS for sensors telemetry data in IoT networks." Mathematical Biosciences and Engineering 19, no. 10 (2022): 10550–80. http://dx.doi.org/10.3934/mbe.2022493.
Full textDat-Thinh, Nguyen, Ho Xuan-Ninh, and Le Kim-Hung. "MidSiot: A Multistage Intrusion Detection System for Internet of Things." Wireless Communications and Mobile Computing 2022 (February 21, 2022): 1–15. http://dx.doi.org/10.1155/2022/9173291.
Full textGluskin, Efim. "APS Insertion Devices: Recent Developments and Results." Journal of Synchrotron Radiation 5, no. 3 (May 1, 1998): 189–95. http://dx.doi.org/10.1107/s0909049597013769.
Full textMatebesi, Unopa, and Nonofo M. J. Ditshego. "Indium Gallium Zinc Oxide FinFET Compared with Silicon FinFET." Journal of Nano Research 68 (June 29, 2021): 103–13. http://dx.doi.org/10.4028/www.scientific.net/jnanor.68.103.
Full textLevichev, Eugene, and Nikolay Vinokurov. "Undulators and Other Insertion Devices." Reviews of Accelerator Science and Technology 03, no. 01 (January 2010): 203–20. http://dx.doi.org/10.1142/s1793626810000403.
Full textCortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine, and Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models." Journal of Healthcare Engineering 2018 (October 14, 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.
Full textR. Zarzoor, Ahmed, Nadia Adnan Shiltagh Al-Jamali, and Dina A. Abdul Qader. "Intrusion detection method for internet of things based on the spiking neural network and decision tree method." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 2278. http://dx.doi.org/10.11591/ijece.v13i2.pp2278-2288.
Full textKimbrough, Joevonte, Lauren Williams, Qunying Yuan, and Zhigang Xiao. "Dielectrophoresis-Based Positioning of Carbon Nanotubes for Wafer-Scale Fabrication of Carbon Nanotube Devices." Micromachines 12, no. 1 (December 25, 2020): 12. http://dx.doi.org/10.3390/mi12010012.
Full textAlsharif, Maram, and Danda B. Rawat. "Study of Machine Learning for Cloud Assisted IoT Security as a Service." Sensors 21, no. 4 (February 3, 2021): 1034. http://dx.doi.org/10.3390/s21041034.
Full textJaved, Abbas, Amna Ehtsham, Muhammad Jawad, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi, and Hadi Larijani. "Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes." Future Internet 16, no. 6 (June 5, 2024): 200. http://dx.doi.org/10.3390/fi16060200.
Full textMyridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas, and Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring." Future Internet 12, no. 3 (March 10, 2020): 48. http://dx.doi.org/10.3390/fi12030048.
Full textAlsharif, Nada Abdu, Shailendra Mishra, and Mohammed Alshehri. "IDS in IoT using Machine Learning and Blockchain." Engineering, Technology & Applied Science Research 13, no. 4 (August 9, 2023): 11197–203. http://dx.doi.org/10.48084/etasr.5992.
Full textRani, K. Swapna, Gayatri Parasa, D. Hemanand, S. V. Devika, S. Balambigai, M. I. Thariq Hussan, Koppuravuri Gurnadha Gupta, Y. J. Nagendra Kumar, and Alok Jain. "Implementation of a multi-stage intrusion detection systems framework for strengthening security on the internet of things." MATEC Web of Conferences 392 (2024): 01106. http://dx.doi.org/10.1051/matecconf/202439201106.
Full textKaushik, Sunil, Akashdeep Bhardwaj, Abdullah Alomari, Salil Bharany, Amjad Alsirhani, and Mohammed Mujib Alshahrani. "Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm." Computers 11, no. 10 (September 20, 2022): 142. http://dx.doi.org/10.3390/computers11100142.
Full textOtoum, Safa, Burak Kantarci, and Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures." ACM Transactions on Internet Technology 21, no. 4 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Full textLiu, Xinzhong, Shouzhi Xuan, Shunqiang Tian, Xu Wu, Yihao Gong, Liyuan Tan, and Guangwei Jiao. "Orbit stabilization for the new insertion devices in SSRF." Journal of Instrumentation 19, no. 01 (January 1, 2024): T01003. http://dx.doi.org/10.1088/1748-0221/19/01/t01003.
Full textChavanne, Joel, Pascal Elleaume, and Pierre Van Vaerenbergh. "The ESRF Insertion Devices." Journal of Synchrotron Radiation 5, no. 3 (May 1, 1998): 196–201. http://dx.doi.org/10.1107/s0909049597012855.
Full textAdefemi Alimi, Kuburat Oyeranti, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer, and Oyeniyi Akeem Alimi. "Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things." Journal of Sensor and Actuator Networks 11, no. 3 (July 1, 2022): 32. http://dx.doi.org/10.3390/jsan11030032.
Full textNajam, Faraz, and Yun Seop Yu. "Compact Trap-Assisted-Tunneling Model for Line Tunneling Field-Effect-Transistor Devices." Applied Sciences 10, no. 13 (June 28, 2020): 4475. http://dx.doi.org/10.3390/app10134475.
Full textCatillo, Marta, Antonio Pecchia, and Umberto Villano. "A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection." Applied Sciences 13, no. 2 (January 7, 2023): 837. http://dx.doi.org/10.3390/app13020837.
Full textUmar, Umar, Kamaluddeen Usman .., Mohd Fadzil Hassan, Aminu Aminu Muazu, and M. S. Liew. "An IoT Device-Level Vulnerability Control Model Through Federated Detection." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 89–98. http://dx.doi.org/10.54216/jisiot.120207.
Full textRomeo, M. D. Shakhawat Shafaet. "Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1217–27. http://dx.doi.org/10.37200/ijpr/v23i4/pr190448.
Full textIsong, Bassey, Otshepeng Kgote, and Adnan Abu-Mahfouz. "Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems." Electronics 13, no. 12 (June 17, 2024): 2370. http://dx.doi.org/10.3390/electronics13122370.
Full textAlsulami, Rehab, Batoul Alqarni, Rawan Alshomrani, Fatimah Mashat, and Tahani Gazdar. "IoT Protocol-Enabled IDS based on Machine Learning." Engineering, Technology & Applied Science Research 13, no. 6 (December 5, 2023): 12373–80. http://dx.doi.org/10.48084/etasr.6421.
Full textChen, Chii-Wen, Mu-Chun Wang, Cheng-Hsun-Tony Chang, Wei-Lun Chu, Shun-Ping Sung, and Wen-How Lan. "Hot Carrier Stress Sensing Bulk Current for 28 nm Stacked High-k nMOSFETs." Electronics 9, no. 12 (December 8, 2020): 2095. http://dx.doi.org/10.3390/electronics9122095.
Full textHsu, Che-Wei, Yueh-Chin Lin, Ming-Wen Lee, and Edward-Yi Chang. "Investigation of the Effect of Different SiNx Thicknesses on the Characteristics of AlGaN/GaN High-Electron-Mobility Transistors in Ka-Band." Electronics 12, no. 20 (October 19, 2023): 4336. http://dx.doi.org/10.3390/electronics12204336.
Full textYas, Harith, and Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network." Journal of Cybersecurity and Information Management 1, no. 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Full textKaramollaoğlu, Hamdullah, İbrahim Alper Doğru, and İbrahim Yücedağ. "An Efficient Deep Learningbased Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques." Information Technology and Control 53, no. 1 (March 22, 2024): 243–61. http://dx.doi.org/10.5755/j01.itc.53.1.34933.
Full textAl-Dhuhli, Maha Abullah, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki, and Rajesh Natarajan. "Intrusion detection system to advance IoT security environment." International Journal of Information Technology, Research and Applications 2, no. 2 (June 22, 2023): 10–17. http://dx.doi.org/10.59461/ijitra.v2i2.48.
Full textZhang, Yang, Yu Tang, Chaoyang Li, Hua Zhang, and Haseeb Ahmad. "Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks." Sensors 24, no. 13 (June 27, 2024): 4188. http://dx.doi.org/10.3390/s24134188.
Full textKhan, Zeeshan Ali, and Ubaid Abbasi. "Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things." Electronics 9, no. 3 (February 29, 2020): 415. http://dx.doi.org/10.3390/electronics9030415.
Full textSahu, Dipti Prava, Biswajit Tripathy, and Leena Samantaray. "Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM." International Journal of Computer Network and Information Security 16, no. 2 (April 8, 2024): 79–91. http://dx.doi.org/10.5815/ijcnis.2024.02.07.
Full textIdrissi, Idriss, Mohammed Boukabous, Mostafa Azizi, Omar Moussaoui, and Hakim El Fadili. "Toward a deep learning-based intrusion detection system for IoT against botnet attacks." IAES International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (March 1, 2021): 110. http://dx.doi.org/10.11591/ijai.v10.i1.pp110-120.
Full textMaidamwar, Priya R., Prasad P. Lokulwar, and Kailash Kumar. "Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment." International Journal of Computer Network and Information Security 15, no. 3 (June 8, 2013): 30–36. http://dx.doi.org/10.5815/ijcnis.2023.03.03.
Full textMeliboev, Azizjon. "IOT NETWORK INTRUSION DETECTION SYSTEM USING MACHINE LEARNING TECHNIQUES." QO‘QON UNIVERSITETI XABARNOMASI 11 (June 30, 2024): 112–15. http://dx.doi.org/10.54613/ku.v11i11.972.
Full textAlsamiri, Jadil, and Khalid Alsubhi. "Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions." Future Internet 15, no. 12 (December 14, 2023): 403. http://dx.doi.org/10.3390/fi15120403.
Full textKhan, Ajmal, Adnan Munir, Zeeshan Kaleem, Farman Ullah, Muhammad Bilal, Lewis Nkenyereye, Shahen Shah, Long D. Nguyen, S. M. Riazul Islam, and Kyung-Sup Kwak. "RDSP: Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management." Sensors 20, no. 2 (January 19, 2020): 548. http://dx.doi.org/10.3390/s20020548.
Full textNazir, Anjum, Zulfiqar Memon, Touseef Sadiq, Hameedur Rahman, and Inam Ullah Khan. "A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection." Sensors 23, no. 19 (September 28, 2023): 8153. http://dx.doi.org/10.3390/s23198153.
Full textZegarra Rodríguez, Demóstenes, Ogobuchi Daniel Okey, Siti Sarah Maidin, Ekikere Umoren Udo, and João Henrique Kleinschmidt. "Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection." PLOS ONE 18, no. 10 (October 16, 2023): e0286652. http://dx.doi.org/10.1371/journal.pone.0286652.
Full textTitov, D. N. "Detection of intrusions into the Internet of things system." Interexpo GEO-Siberia 8, no. 2 (May 18, 2022): 118–25. http://dx.doi.org/10.33764/2618-981x-2022-8-2-118-125.
Full textElangovan, Surya, Stone Cheng, and Edward Yi Chang. "Reliability Characterization of Gallium Nitride MIS-HEMT Based Cascode Devices for Power Electronic Applications." Energies 13, no. 10 (May 21, 2020): 2628. http://dx.doi.org/10.3390/en13102628.
Full textIdrissi, Idriss, Mostafa Azizi, and Omar Moussaoui. "An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (February 1, 2022): 1140. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1140-1150.
Full textPark, Sohyun, and Suphee Sun. ""A Study on The Direction of Sleep-Tech Devices for Middle-aged Women :Focusing on preferences for device types and function"." Journal of Industrial Design Studies 14, no. 4 (December 31, 2020): 51–60. http://dx.doi.org/10.37254/ids.2020.12.54.05.51.
Full textMahmod, Md Jubayer al, and Ujjwal Guin. "A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications." Cryptography 4, no. 1 (March 8, 2020): 8. http://dx.doi.org/10.3390/cryptography4010008.
Full textPamungkas, I. Gede Agung Krisna, Tohari Ahmad, and Royyana Muslim Ijtihadie. "Analysis of Autoencoder Compression Performance in Intrusion Detection System." International Journal of Safety and Security Engineering 12, no. 3 (June 30, 2022): 395–401. http://dx.doi.org/10.18280/ijsse.120314.
Full textLong, S. B., Zhi Gang Li, X. W. Zhao, Bao Qin Chen, and Ming Liu. "Coulomb Staircases and Differential Conductance Oscillations in a SIMOX-Based Single-Electron Transistor." Solid State Phenomena 121-123 (March 2007): 513–16. http://dx.doi.org/10.4028/www.scientific.net/ssp.121-123.513.
Full textNgo, Duc-Minh, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy, and Emanuel Popovici. "HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security." Future Internet 15, no. 1 (December 26, 2022): 9. http://dx.doi.org/10.3390/fi15010009.
Full textMusleh, Dhiaa, Meera Alotaibi, Fahd Alhaidari, Atta Rahman, and Rami M. Mohammad. "Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT." Journal of Sensor and Actuator Networks 12, no. 2 (March 29, 2023): 29. http://dx.doi.org/10.3390/jsan12020029.
Full textJo, Wooyeon, Sungjin Kim, Changhoon Lee, and Taeshik Shon. "Packet Preprocessing in CNN-Based Network Intrusion Detection System." Electronics 9, no. 7 (July 16, 2020): 1151. http://dx.doi.org/10.3390/electronics9071151.
Full textNaithani, Kanchan. "AI-based Intrusion Detection System for Internet of Things (IoT) Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (September 10, 2019): 1095–100. http://dx.doi.org/10.17762/turcomat.v10i2.13631.
Full text