Artigos de revistas sobre o tema "Ids and devices"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Ids and devices".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Naz, Naila, Muazzam A. Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan e Jawad Ahmad. "Ensemble learning-based IDS for sensors telemetry data in IoT networks". Mathematical Biosciences and Engineering 19, n.º 10 (2022): 10550–80. http://dx.doi.org/10.3934/mbe.2022493.
Texto completo da fonteDat-Thinh, Nguyen, Ho Xuan-Ninh e Le Kim-Hung. "MidSiot: A Multistage Intrusion Detection System for Internet of Things". Wireless Communications and Mobile Computing 2022 (21 de fevereiro de 2022): 1–15. http://dx.doi.org/10.1155/2022/9173291.
Texto completo da fonteGluskin, Efim. "APS Insertion Devices: Recent Developments and Results". Journal of Synchrotron Radiation 5, n.º 3 (1 de maio de 1998): 189–95. http://dx.doi.org/10.1107/s0909049597013769.
Texto completo da fonteMatebesi, Unopa, e Nonofo M. J. Ditshego. "Indium Gallium Zinc Oxide FinFET Compared with Silicon FinFET". Journal of Nano Research 68 (29 de junho de 2021): 103–13. http://dx.doi.org/10.4028/www.scientific.net/jnanor.68.103.
Texto completo da fonteLevichev, Eugene, e Nikolay Vinokurov. "Undulators and Other Insertion Devices". Reviews of Accelerator Science and Technology 03, n.º 01 (janeiro de 2010): 203–20. http://dx.doi.org/10.1142/s1793626810000403.
Texto completo da fonteCortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine e Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models". Journal of Healthcare Engineering 2018 (14 de outubro de 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.
Texto completo da fonteR. Zarzoor, Ahmed, Nadia Adnan Shiltagh Al-Jamali e Dina A. Abdul Qader. "Intrusion detection method for internet of things based on the spiking neural network and decision tree method". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 2 (1 de abril de 2023): 2278. http://dx.doi.org/10.11591/ijece.v13i2.pp2278-2288.
Texto completo da fonteKimbrough, Joevonte, Lauren Williams, Qunying Yuan e Zhigang Xiao. "Dielectrophoresis-Based Positioning of Carbon Nanotubes for Wafer-Scale Fabrication of Carbon Nanotube Devices". Micromachines 12, n.º 1 (25 de dezembro de 2020): 12. http://dx.doi.org/10.3390/mi12010012.
Texto completo da fonteAlsharif, Maram, e Danda B. Rawat. "Study of Machine Learning for Cloud Assisted IoT Security as a Service". Sensors 21, n.º 4 (3 de fevereiro de 2021): 1034. http://dx.doi.org/10.3390/s21041034.
Texto completo da fonteJaved, Abbas, Amna Ehtsham, Muhammad Jawad, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi e Hadi Larijani. "Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes". Future Internet 16, n.º 6 (5 de junho de 2024): 200. http://dx.doi.org/10.3390/fi16060200.
Texto completo da fonteMyridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas e Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring". Future Internet 12, n.º 3 (10 de março de 2020): 48. http://dx.doi.org/10.3390/fi12030048.
Texto completo da fonteAlsharif, Nada Abdu, Shailendra Mishra e Mohammed Alshehri. "IDS in IoT using Machine Learning and Blockchain". Engineering, Technology & Applied Science Research 13, n.º 4 (9 de agosto de 2023): 11197–203. http://dx.doi.org/10.48084/etasr.5992.
Texto completo da fonteRani, K. Swapna, Gayatri Parasa, D. Hemanand, S. V. Devika, S. Balambigai, M. I. Thariq Hussan, Koppuravuri Gurnadha Gupta, Y. J. Nagendra Kumar e Alok Jain. "Implementation of a multi-stage intrusion detection systems framework for strengthening security on the internet of things". MATEC Web of Conferences 392 (2024): 01106. http://dx.doi.org/10.1051/matecconf/202439201106.
Texto completo da fonteKaushik, Sunil, Akashdeep Bhardwaj, Abdullah Alomari, Salil Bharany, Amjad Alsirhani e Mohammed Mujib Alshahrani. "Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm". Computers 11, n.º 10 (20 de setembro de 2022): 142. http://dx.doi.org/10.3390/computers11100142.
Texto completo da fonteOtoum, Safa, Burak Kantarci e Hussein Mouftah. "A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures". ACM Transactions on Internet Technology 21, n.º 4 (22 de julho de 2021): 1–22. http://dx.doi.org/10.1145/3406093.
Texto completo da fonteLiu, Xinzhong, Shouzhi Xuan, Shunqiang Tian, Xu Wu, Yihao Gong, Liyuan Tan e Guangwei Jiao. "Orbit stabilization for the new insertion devices in SSRF". Journal of Instrumentation 19, n.º 01 (1 de janeiro de 2024): T01003. http://dx.doi.org/10.1088/1748-0221/19/01/t01003.
Texto completo da fonteChavanne, Joel, Pascal Elleaume e Pierre Van Vaerenbergh. "The ESRF Insertion Devices". Journal of Synchrotron Radiation 5, n.º 3 (1 de maio de 1998): 196–201. http://dx.doi.org/10.1107/s0909049597012855.
Texto completo da fonteAdefemi Alimi, Kuburat Oyeranti, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer e Oyeniyi Akeem Alimi. "Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things". Journal of Sensor and Actuator Networks 11, n.º 3 (1 de julho de 2022): 32. http://dx.doi.org/10.3390/jsan11030032.
Texto completo da fonteNajam, Faraz, e Yun Seop Yu. "Compact Trap-Assisted-Tunneling Model for Line Tunneling Field-Effect-Transistor Devices". Applied Sciences 10, n.º 13 (28 de junho de 2020): 4475. http://dx.doi.org/10.3390/app10134475.
Texto completo da fonteCatillo, Marta, Antonio Pecchia e Umberto Villano. "A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection". Applied Sciences 13, n.º 2 (7 de janeiro de 2023): 837. http://dx.doi.org/10.3390/app13020837.
Texto completo da fonteUmar, Umar, Kamaluddeen Usman .., Mohd Fadzil Hassan, Aminu Aminu Muazu e M. S. Liew. "An IoT Device-Level Vulnerability Control Model Through Federated Detection". Journal of Intelligent Systems and Internet of Things 12, n.º 2 (2024): 89–98. http://dx.doi.org/10.54216/jisiot.120207.
Texto completo da fonteRomeo, M. D. Shakhawat Shafaet. "Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home". International Journal of Psychosocial Rehabilitation 23, n.º 4 (20 de dezembro de 2019): 1217–27. http://dx.doi.org/10.37200/ijpr/v23i4/pr190448.
Texto completo da fonteIsong, Bassey, Otshepeng Kgote e Adnan Abu-Mahfouz. "Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems". Electronics 13, n.º 12 (17 de junho de 2024): 2370. http://dx.doi.org/10.3390/electronics13122370.
Texto completo da fonteAlsulami, Rehab, Batoul Alqarni, Rawan Alshomrani, Fatimah Mashat e Tahani Gazdar. "IoT Protocol-Enabled IDS based on Machine Learning". Engineering, Technology & Applied Science Research 13, n.º 6 (5 de dezembro de 2023): 12373–80. http://dx.doi.org/10.48084/etasr.6421.
Texto completo da fonteChen, Chii-Wen, Mu-Chun Wang, Cheng-Hsun-Tony Chang, Wei-Lun Chu, Shun-Ping Sung e Wen-How Lan. "Hot Carrier Stress Sensing Bulk Current for 28 nm Stacked High-k nMOSFETs". Electronics 9, n.º 12 (8 de dezembro de 2020): 2095. http://dx.doi.org/10.3390/electronics9122095.
Texto completo da fonteHsu, Che-Wei, Yueh-Chin Lin, Ming-Wen Lee e Edward-Yi Chang. "Investigation of the Effect of Different SiNx Thicknesses on the Characteristics of AlGaN/GaN High-Electron-Mobility Transistors in Ka-Band". Electronics 12, n.º 20 (19 de outubro de 2023): 4336. http://dx.doi.org/10.3390/electronics12204336.
Texto completo da fonteYas, Harith, e Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network". Journal of Cybersecurity and Information Management 1, n.º 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Texto completo da fonteKaramollaoğlu, Hamdullah, İbrahim Alper Doğru e İbrahim Yücedağ. "An Efficient Deep Learningbased Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques". Information Technology and Control 53, n.º 1 (22 de março de 2024): 243–61. http://dx.doi.org/10.5755/j01.itc.53.1.34933.
Texto completo da fonteAl-Dhuhli, Maha Abullah, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki e Rajesh Natarajan. "Intrusion detection system to advance IoT security environment". International Journal of Information Technology, Research and Applications 2, n.º 2 (22 de junho de 2023): 10–17. http://dx.doi.org/10.59461/ijitra.v2i2.48.
Texto completo da fonteZhang, Yang, Yu Tang, Chaoyang Li, Hua Zhang e Haseeb Ahmad. "Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks". Sensors 24, n.º 13 (27 de junho de 2024): 4188. http://dx.doi.org/10.3390/s24134188.
Texto completo da fonteKhan, Zeeshan Ali, e Ubaid Abbasi. "Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things". Electronics 9, n.º 3 (29 de fevereiro de 2020): 415. http://dx.doi.org/10.3390/electronics9030415.
Texto completo da fonteSahu, Dipti Prava, Biswajit Tripathy e Leena Samantaray. "Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM". International Journal of Computer Network and Information Security 16, n.º 2 (8 de abril de 2024): 79–91. http://dx.doi.org/10.5815/ijcnis.2024.02.07.
Texto completo da fonteIdrissi, Idriss, Mohammed Boukabous, Mostafa Azizi, Omar Moussaoui e Hakim El Fadili. "Toward a deep learning-based intrusion detection system for IoT against botnet attacks". IAES International Journal of Artificial Intelligence (IJ-AI) 10, n.º 1 (1 de março de 2021): 110. http://dx.doi.org/10.11591/ijai.v10.i1.pp110-120.
Texto completo da fonteMaidamwar, Priya R., Prasad P. Lokulwar e Kailash Kumar. "Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment". International Journal of Computer Network and Information Security 15, n.º 3 (8 de junho de 2013): 30–36. http://dx.doi.org/10.5815/ijcnis.2023.03.03.
Texto completo da fonteMeliboev, Azizjon. "IOT NETWORK INTRUSION DETECTION SYSTEM USING MACHINE LEARNING TECHNIQUES". QO‘QON UNIVERSITETI XABARNOMASI 11 (30 de junho de 2024): 112–15. http://dx.doi.org/10.54613/ku.v11i11.972.
Texto completo da fonteAlsamiri, Jadil, e Khalid Alsubhi. "Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions". Future Internet 15, n.º 12 (14 de dezembro de 2023): 403. http://dx.doi.org/10.3390/fi15120403.
Texto completo da fonteKhan, Ajmal, Adnan Munir, Zeeshan Kaleem, Farman Ullah, Muhammad Bilal, Lewis Nkenyereye, Shahen Shah, Long D. Nguyen, S. M. Riazul Islam e Kyung-Sup Kwak. "RDSP: Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management". Sensors 20, n.º 2 (19 de janeiro de 2020): 548. http://dx.doi.org/10.3390/s20020548.
Texto completo da fonteNazir, Anjum, Zulfiqar Memon, Touseef Sadiq, Hameedur Rahman e Inam Ullah Khan. "A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection". Sensors 23, n.º 19 (28 de setembro de 2023): 8153. http://dx.doi.org/10.3390/s23198153.
Texto completo da fonteZegarra Rodríguez, Demóstenes, Ogobuchi Daniel Okey, Siti Sarah Maidin, Ekikere Umoren Udo e João Henrique Kleinschmidt. "Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection". PLOS ONE 18, n.º 10 (16 de outubro de 2023): e0286652. http://dx.doi.org/10.1371/journal.pone.0286652.
Texto completo da fonteTitov, D. N. "Detection of intrusions into the Internet of things system". Interexpo GEO-Siberia 8, n.º 2 (18 de maio de 2022): 118–25. http://dx.doi.org/10.33764/2618-981x-2022-8-2-118-125.
Texto completo da fonteElangovan, Surya, Stone Cheng e Edward Yi Chang. "Reliability Characterization of Gallium Nitride MIS-HEMT Based Cascode Devices for Power Electronic Applications". Energies 13, n.º 10 (21 de maio de 2020): 2628. http://dx.doi.org/10.3390/en13102628.
Texto completo da fonteIdrissi, Idriss, Mostafa Azizi e Omar Moussaoui. "An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices". Indonesian Journal of Electrical Engineering and Computer Science 25, n.º 2 (1 de fevereiro de 2022): 1140. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1140-1150.
Texto completo da fontePark, Sohyun, e Suphee Sun. ""A Study on The Direction of Sleep-Tech Devices for Middle-aged Women :Focusing on preferences for device types and function"". Journal of Industrial Design Studies 14, n.º 4 (31 de dezembro de 2020): 51–60. http://dx.doi.org/10.37254/ids.2020.12.54.05.51.
Texto completo da fonteMahmod, Md Jubayer al, e Ujjwal Guin. "A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications". Cryptography 4, n.º 1 (8 de março de 2020): 8. http://dx.doi.org/10.3390/cryptography4010008.
Texto completo da fontePamungkas, I. Gede Agung Krisna, Tohari Ahmad e Royyana Muslim Ijtihadie. "Analysis of Autoencoder Compression Performance in Intrusion Detection System". International Journal of Safety and Security Engineering 12, n.º 3 (30 de junho de 2022): 395–401. http://dx.doi.org/10.18280/ijsse.120314.
Texto completo da fonteLong, S. B., Zhi Gang Li, X. W. Zhao, Bao Qin Chen e Ming Liu. "Coulomb Staircases and Differential Conductance Oscillations in a SIMOX-Based Single-Electron Transistor". Solid State Phenomena 121-123 (março de 2007): 513–16. http://dx.doi.org/10.4028/www.scientific.net/ssp.121-123.513.
Texto completo da fonteNgo, Duc-Minh, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy e Emanuel Popovici. "HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security". Future Internet 15, n.º 1 (26 de dezembro de 2022): 9. http://dx.doi.org/10.3390/fi15010009.
Texto completo da fonteMusleh, Dhiaa, Meera Alotaibi, Fahd Alhaidari, Atta Rahman e Rami M. Mohammad. "Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT". Journal of Sensor and Actuator Networks 12, n.º 2 (29 de março de 2023): 29. http://dx.doi.org/10.3390/jsan12020029.
Texto completo da fonteJo, Wooyeon, Sungjin Kim, Changhoon Lee e Taeshik Shon. "Packet Preprocessing in CNN-Based Network Intrusion Detection System". Electronics 9, n.º 7 (16 de julho de 2020): 1151. http://dx.doi.org/10.3390/electronics9071151.
Texto completo da fonteNaithani, Kanchan. "AI-based Intrusion Detection System for Internet of Things (IoT) Networks". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n.º 2 (10 de setembro de 2019): 1095–100. http://dx.doi.org/10.17762/turcomat.v10i2.13631.
Texto completo da fonte