نتایج جستجو برای: wids
تعداد نتایج: 31 فیلتر نتایج به سال:
This work presents a novel method for applying test-time augmentation (TTA) to tabular data. We used TTA along with an ensemble of 42 models achieve higher performance on the MIT Global Open Source Severity Illness Score dataset consisting 131,051 ICU visits and outcomes. achieved AUC 0.915 private test set (19,669 admissions) won first place at Stanford University's WiDS Datathon 2020 challeng...
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
Effectiveness of information security of APCS (automated process control systems), as well as of SCADA (supervisory control and data acquisition) systems, depends on data transmission’s protection technologies applied on transport environment’s components. This article investigates the problem of detecting attacks on WSN (wireless sensor networks) of SCADA systems. As the result of analytical s...
Security of Wireless network becomes associate in nursing woeful necessary issues with the speedy development of wireless network that is in danger for an honest vary of attacks due to preparation among the hostile atmosphere and having limited resources. Now a day wireless detection network is a unit which is loosely utilized in environmental management, police investigation tasks, monitoring ...
A Wireless Intrusion Detection System is an important part of any system or company connected to the internet and has a wireless connection inside it because increasing number internal external attacks on network. These WIDS systems are used predict detect network such as flooding, DoS attack, evil- twin that badly affect availability. Artificial intelligence (Machine Learning, Deep Learning) p...
WikiV3 is the successor of WikiMatch (participated in OAEI 2012 and 2013) which explores Wikipedia as one external knowledgebase for ontology matching. The results show that the matcher is slightly better than matchers based on string equality and can get higher recall values. Moreover due to the construction of the system it is able to compute mappings in a multilingual setup. 1 Presentation o...
ViGAT: Bottom-Up Event Recognition and Explanation in Video Using Factorized Graph Attention Network
In this paper a pure-attention bottom-up approach, called ViGAT, that utilizes an object detector together with Vision Transformer (ViT) backbone network to derive and frame features, head process these features for the task of event recognition explanation in video, is proposed. The ViGAT consists graph attention (GAT) blocks factorized along spatial temporal dimensions order capture effective...
The advancement of network technology has been offering substantial improvements for users in general. Paradoxically, new technologies end up bringing also new types of problems. Not only one can find issues related to architecture failure, mis-configuration and bad adaptation, but also a growing number of problems related to user security. The latter is a problem strongly connected to wireless...
Intrusion detection systems (IDS) strive to catch computer system intrusion & utilize by any garnering and analyzing data. Wireless IDSs garner all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic. These wireless IDS can monitor and analyze user and system activities of known attacks, identity abnormal network activity and det...
This paper discusses the use of Evolving Personal Agent Environments as a potential solution to the problem of information overload as experienced in habitual Web surrng. Some rst experimental results on evolving user prooles using speciating hybrid GAs, the reasoning behind them and support for their potential application in mobile, wireless and location aware information devices are also pres...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید