Essays about: "Intrusion Detection System"
Showing result 16 - 20 of 91 essays containing the words Intrusion Detection System.
-
16. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
17. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
18. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System
University essay fromAbstract : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. READ MORE
-
19. A Quantitative Microbial Risk Assessment Associated with Cross-Connections in the Drinking Water Network in Combination with Hydraulic Modeling
University essay from Uppsala universitet/Institutionen för geovetenskaperAbstract : Drinking water companies have the technology and responsibility to deliver safe and high-quality drinking water to the water distribution systems network (WDN). However, many events within the WDN, such as cross-connections and backflow, might degrade water quality and pose public health risks to consumers. READ MORE
-
20. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE