_ | intrusion | _ |
3D | intrusion | Detection System with Uncalibrated Multiple Cameras |
Accuracy and Resolution of ALOS Interferometry: Vector Deformation Maps of the Father's Day | intrusion | at Kilauea |
ACO-based | intrusion | Detection Method in Computer Networks using Fuzzy Association Rules |
Acoustic Based Surveillance System for | intrusion | Detection |
Actual and Forecasted Vulnerability Assessment to Seawater | intrusion | via GALDIT-SUSI in the Volturno River Mouth (Italy) |
AdaptIDS: Adaptive | intrusion | Detection for Mission-Critical Aerospace Vehicles |
Adaptive | intrusion | Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications |
AI-Based | intrusion | Detection Systems for In-Vehicle Networks: A Survey |
Airborne LiDAR Assisted Obstacle Recognition and | intrusion | Detection Towards Unmanned Aerial Vehicle: Architecture, Modeling and Evaluation |
Analysis of Recent Deep-Learning-Based | intrusion | Detection Methods for In-Vehicle Network |
Analyzing and Detecting Network | intrusion | Behavior Using Packet Capture |
Anomaly | intrusion | Detection in Online Learning Space Based on XGBoost |
Artificial intelligence based ensemble approach for | intrusion | detection systems |
Automatically adjustable and self-testing dual technology | intrusion | detection system for minimizing false alarms |
clustering-based method for unsupervised | intrusion | detections, A |
Coastal Current | intrusion | s from Satellite Altimetry |
Collaborative | intrusion | Detection for VANETs: A Deep Learning-Based Distributed SDN Approach |
Collaborative | intrusion | Detection System against DDoS for SDN, A |
Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting | intrusion | s in Computer Networks |
Comparison of Background Extraction Based | intrusion | Detection Algorithms |
Conceptual Analysis of | intrusion | Alarms |
Correcting Calibration Drifts Using Solar and Lunar | intrusion | s for Miniaturized Microwave Radiometers |
Data Enhancement Model for | intrusion | Detection In Smart Home, A |
Deep Active Learning | intrusion | Detection and Load Balancing in Software-Defined Vehicular Networks |
Density-based Undersampling Approach to | intrusion | Detection, A |
Design and Analysis of Multimodel-Based Anomaly | intrusion | Detection Systems in Industrial Process Automation |
Design of Blockchain enabled | intrusion | detection model for detecting security attacks using deep learning |
Detection Of Dry | intrusion | On Water Vapor Images Over Central Europe: June 2010 To September 2011 |
Detection of | intrusion | behavior in cloud applications using Pearson's chi-squared distribution and decision tree classifiers |
Digital video | intrusion | intelligent detection method based on narrowband Internet of Things and its application |
Distributed | intrusion | Detection System for Ad-Hoc Wireless Sensor Networks: The AWISSENET Distributed Intrusion Detection System, A |
Distributed | intrusion | Detection System for Ad-Hoc Wireless Sensor Networks: The AWISSENET Distributed Intrusion Detection System, A |
Dual sensing | intrusion | detection method and system with state-level fusion |
Effective Deep Learning Based Scheme for Network | intrusion | Detection, An |
Effective | intrusion | Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus |
Effects of Solar | intrusion | on the Calibration of the Metop-C Advanced Microwave Sounding Unit-A2 Channels |
Efficient | intrusion | Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning, An |
Enhanced Few-Shot Learning for | intrusion | Detection in Railway Video Surveillance |
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive | intrusion | Detection System |
Explainable Deep Learning Framework for Resilient | intrusion | Detection in IoT-Enabled Transportation Networks, An |
Federated | intrusion | Detection in Blockchain-Based Smart Transportation Systems |
Filter Model Based on Hidden Generalized Mixture Transition Distribution Model for | intrusion | Detection System in Vehicle Ad Hoc Networks, A |
Fusion of multiple classifiers for | intrusion | detection in computer networks |
genetic clustering method for | intrusion | detection, A |
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly | intrusion | detection |
Graph-Based | intrusion | Detection System for Controller Area Networks |
High Throughput Signature Based Platform for Network | intrusion | Detection |
Histogram-Based | intrusion | Detection and Filtering Framework for Secure and Safe In-Vehicle Networks |
Host-based | intrusion | detection using dynamic and static behavioral models |
Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus | intrusion | Detection in the In-Vehicle Network, The |
IIDS: Intelligent | intrusion | Detection System for Sustainable Development in Autonomous Vehicles |
Impacts of the Kuroshio | intrusion | through the Luzon Strait on the Local Precipitation Anomaly |
Improved Lunar | intrusion | Detection Algorithm for the CrIS Sensor Data Record |
Intelligent Recognition of TCP | intrusion | s for Embedded Micro-controllers |
Intruders, | intrusion | s, Intrusion Detection, Threats |
Intruders, | intrusion | s, Intrusion Detection, Threats |
| intrusion | Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology |
| intrusion | Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System |
| intrusion | Detection for Maritime Transportation Systems With Batch Federated Aggregation |
| intrusion | detection in computer networks by multiple classifier systems |
| intrusion | Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling |
| intrusion | Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems, An |
| intrusion | Detection System Using Deep Learning and Its Application to Wi-Fi Network |
| intrusion | Detection Using Extraction of Moving Edges |
| intrusion | detection using hierarchical neural networks |
| intrusion | detection using mouse dynamics |
| intrusion | monitoring system design based on 3D face recognition, An |
Learning | intrusion | Detection: Supervised or Unsupervised? |
LSTM-Based | intrusion | Detection System for VANETs: A Time Series Classification Approach to False Message Detection |
Many-Objective Optimization Based | intrusion | Detection for in-Vehicle Network Security |
Method and apparatus for automatically detecting | intrusion | object into view of image pickup device |
MF-Net: Multi-frequency | intrusion | detection network for Internet traffic data |
Model-Based Method for Enabling Source Mapping and | intrusion | Detection on Proprietary Can Bus, A |
Modelling | intrusion | detection as an allocation problem |
Modification of supervised OPF-based | intrusion | detection systems using unsupervised learning and social network concept |
Multibranch Reconstruction Error (MbRE) | intrusion | Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks |
N-STGAT: Spatio-Temporal Graph Neural Network Based Network | intrusion | Detection for Near-Earth Remote Sensing |
Network Analysis, Wireless, Network | intrusion | |
Network | intrusion | Detection Based on Neural Networks and D-S Evidence |
Network | intrusion | Detection by Combining One-Class Classifiers |
Network | intrusion | detection in covariance feature space |
network | intrusion | detection method using independent component analysis, A |
Network optimization using defender system in cloud computing security based | intrusion | detection system withgame theory deep neural network (IDSGT-DNN) |
Novel Hybrid Data Reduction Strategy and Its Application to | intrusion | Detection, A |
Orange Snow: A Saharan Dust | intrusion | over Romania During Winter Conditions |
Parzen-window network | intrusion | detectors |
Perimeter- | intrusion | event classification for on-line detection using multiple instance learning solving temporal ambiguities |
Predicting Adversarial Cyber- | intrusion | Stages Using Autoregressive Neural Networks |
Probability-Based Location Aware Design and On-Demand Robotic | intrusion | Detection System |
Real-time multi-agent system for an adaptive | intrusion | detection system |
Remotely Sensed Seasonal Shoreward | intrusion | of the East Australian Current: Implications for Coastal Ocean Dynamics |
Robust real-time | intrusion | detection with fuzzy classification |
Sea Surface pCO2 Response to Typhoon Wind Pump and Kuroshio | intrusion | in the Northeastern South China Sea |
Sentinel-1 SAR Time Series-Based Assessment of the Impact of Severe Salinity | intrusion | Events on Spatiotemporal Changes in Distribution of Rice Planting Areas in Coastal Provinces of the Mekong Delta, Vietnam |
Sequential Classifiers Combination Method to Reduce False Negative for | intrusion | Detection System, A |
Spatial Analysis of a Rapid | intrusion | Event of the East Australian Current Using High Frequency Radar Data |
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network | intrusion | Detection |
Strong Kuroshio | intrusion | into the South China Sea and Its Accompanying Cold-Core Anticyclonic Eddy in Winter 2020-2021, A |
Survey of | intrusion | Detection for In-Vehicle Networks, A |
Survey on Data-Driven Network | intrusion | Detection, A |
SVM Based | intrusion | Detection Method with Nonlinear Scaling and Feature Selection |
testing framework for background subtraction algorithms comparison in | intrusion | detection context, A |
Threat Analysis for Automotive CAN Networks: A GAN Model-Based | intrusion | Detection Technique |
Toward Credible Evaluation of Anomaly-Based | intrusion | -Detection Methods |
Towards a Generic Feature-Selection Measure for | intrusion | Detection |
triangle area based nearest neighbors approach to | intrusion | detection, A |
Two-Stage | intrusion | Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks |
Unsupervised and Adaptive Perimeter | intrusion | Detector |
Unsupervised | intrusion | Detection Using Color Images |
Using a Fuzzy Inference System to Reduce False Positives in | intrusion | Detection |
Vertical Migration of the Along-Slope Counter-Flow and Its Relation with the Kuroshio | intrusion | off Northeastern Taiwan |
Video-type universal motion and | intrusion | detection system |
WatchNet++: efficient and accurate depth-based network for detecting people attacks and | intrusion | |
Wrapper feature selection method based differential evolution and extreme learning machine for | intrusion | detection system |
114 for intrusion
_ | intrusive | _ |
Feature Selection Based on | intrusive | Outliers Rather Than All Instances |
Image deblurring for less | intrusive | iris capture |
Industrial Non- | intrusive | Coded-Target Identification and Decoding Application |
| intrusive | and non-intrusive watermarking |
| intrusive | and non-intrusive watermarking |
Mapping of | intrusive | Complex on a Small Scale Using Multi-Source Remote Sensing Images |
Multimodal Non- | intrusive | Stress Monitoring From the Pleasure-Arousal Emotional Dimensions, A |
New single-ended objective measure for non- | intrusive | speech quality evaluation |
Non- | intrusive | automated measurement of dairy cow body condition using 3D video |
Non- | intrusive | Binaural Speech Intelligibility Prediction From Discrete Latent Representations |
Non- | intrusive | eye gaze estimation without knowledge of eye pose |
Non- | intrusive | Gaze Tracking Using Artificial Neural Networks |
Non- | intrusive | Iris Image Capturing System Using Light Stripe Projection and Pan-Tilt-Zoom Camera |
Non- | intrusive | liveness detection by face images |
Non- | intrusive | Method for Copy-Move Forgery Detection, A |
non- | intrusive | method for user focus of attention estimation in front of a computer monitor, A |
Non- | intrusive | Physiological Monitoring for Automated Stress Detection in Human-Computer Interaction |
Non- | intrusive | Planning the Roadside Infrastructure for Vehicular Networks |
Non- | intrusive | speech-quality assessment using vocal-tract models |
Novel Approach to Real-time Non- | intrusive | Gaze Finding, A |
novel non- | intrusive | eye gaze estimation using cross-ratio under large head motion, A |
Outlier Detection in Non- | intrusive | ECG Biometric System |
Scalable, self-organizing 3D camera network for non- | intrusive | people tracking and counting |
simply integrated dual-sensor based non- | intrusive | iris image acquisition system, A |
Survey on | intrusive | Load Monitoring for Appliance Recognition, A |
Towards an Intelligent Bed Sensor: Non- | intrusive | Monitoring of Sleep Irregularities with Computer Vision Techniques |
26 for intrusive