SciMatic
Journals
Thesis Rep
Docs
Products
SciMatic.net
Journament
Journal Manager
Subjects
Thesis
ImProofer
Research Groups
Letter Pad
Conferences
Services
About
SciMatic
Team
Earn With Us
Join Us
Contact Us
EN
English
Türkçe
Español
Português
Pусский
Filipino
Tiếng Việt
हिन्दी
العربية
বাংলা
Deutsch
中文
Login
Keyword Connections
ntru
Journals
0
No Journal Connected
Research Groups
0
No Research Group Connected
Bibliographies
155
1
NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks
2
Improving Intrusion Detection Model Prediction by Threshold Adaptation
3
Unusual winter Saharan dust intrusions at Northwest Spain: Air quality, radiative and health impacts.
4
Kernel-Space Intrusion Detection Using Software-Defined Networking
5
An analytical model of bubble-facilitated vapor intrusion.
6
Cn29, a novel orphan peptide found in the venom of the scorpion Centruroides noxius: Structure and function
7
Redefining the Acting Internship in the Era of Entrustment: One Institution’s Approach to Reforming the Acting Internship
8
A Review on Ethno-Medicinal and Pharmacological Activities of Sphenocentrum jollyanum Pierre.
9
VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment
10
Use of the electrodiagnostic entrustable professional activity for competency assessment in Physical Medicine and Rehabilitation training programs.
11
Interactive three-dimensional visualization of network intrusion detection data for machine learning
12
Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.
13
Ethical limits to the intrusiveness of online advertising formats: A critical review of Better Ads Standards
14
Experimental study of heat transfer performance of compact wavy channel with nanofluids as the coolant medium: Real time non-intrusive measurements
15
Potential of mixed hydraulic barriers to remediate seawater intrusion.
16
Corrigendum to: Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature (Computational Intelligence and Neuroscience (2017) 2017 (4216281) DOI: 10.1155/2017/4216281)
17
Beschwerdebefugnis des Insolvenzverwalters eines Medizinischen Versorgungszentrums gegen die Entziehung der Zulassung
18
Bereitschaftsdienst (Notdienst) im Medizinischen Versorgungszentrum (MVZ)
19
Distributed Architecture of an Intrusion Detection System Based on Cloud Computing and Big Data Techniques
20
Design of the Network Security Intrusion Detection System Based on the Cloud Computing
21
Modelling the Intrusive Feelings of Advanced Driver Assistance Systems Based on Vehicle Activity Log Data: Case Study for the Lane Keeping Assistance System
22
Machine learning techniques for IoT intrusions detection in aerospace cyber-physical systems
23
High-Speed Railway Intruding Object Image Generating with Generative Adversarial Networks.
24
Inhibition of harmful algae Phaeocystis globosa and Prorocentrum donghaiense by extracts of coastal invasive plant Spartina alterniflora
25
Development of a Postgraduate Community Pharmacist Specialization Program Using CanMEDS Competencies, and Entrustable Professional Activities.
26
The response of Prorocentrum sigmoides and its associated culturable bacteria to metals and organic pollutants.
27
HYPOTHESIS‐BASED INTERVENTIONS FOR TANTRUM BEHAVIORS OF PERSONS WITH DEVELOPMENTAL DISABILITIES IN SCHOOL SETTINGS
28
Relations Between Facebook Intrusion, Internet Addiction, Life Satisfaction, and Self-Esteem: a Study in Italy and the USA
29
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
30
Assessing groundwater vulnerability to sea water intrusion in the coastline of the inner Puck Bay using GALDIT method
31
Lozenge tilings of doubly-intruded hexagons
32
Exploring the introduction of entrustment rating scales in an existing objective structured clinical examination.
33
Deep learning and machine learning techniques for intrusion detection and prevention in wireless sensor networks: Comparative study and performance analysis
34
Assessing sea-level rise impact on saltwater intrusion into the root zone of a geo-typical area in coastal east-central Florida.
35
A low rate energy disaggregation using non-intrusive load monitoring
36
Multi-Label Classification Based on Random Forest Algorithm for Non-Intrusive Load Monitoring System
37
Potential ASME code case for contruction of compact heat exchangers in high tempertaure reactors
38
Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks
39
Vulnerability Indexing to Saltwater Intrusion from Models at Two Levels using Artificial Intelligence Multiple Model (AIMM)
40
A Closer Look at Intrusion Detection System for Web Applications
41
Support Vector Machine Based Intrusion Detection Method Combined with Nonlinear Dimensionality Reduction Algorithm
42
NIML: Non-intrusive machine learning-based speech quality prediction on VoIP networks
43
Understanding Entrustment Decision-Making by Surgical Program Directors.
44
ML-IDS: MAC Layer Trust-Based Intrusion Detection System for Wireless Sensor Networks
45
Using an Entrustable Professional Activity to Assess Consultation Requests Called on an Internal Medicine Teaching Service.
46
A Machine Learning Based Intrusion Detection System for Mobile Internet of Things.
47
A new plumbing system framework for mantle plume-related continental Large Igneous Provinces and their mafic-ultramafic intrusions
48
Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.
49
Two Drinking Water Outbreaks Caused by Wastewater Intrusion Including Sapovirus in Finland.
50
A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions in Wireless Sensor Networks.
51
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.
52
Wi-Alarm: Low-Cost Passive Intrusion Detection Using WiFi.
53
India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach.
54
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
55
Potential CO intrusion in near-surface environments: a review of current research approaches to geochemical processes.
56
Intrusion detection system using an optimized kernel extreme learning machine and efficient features
57
Robust adaptive multivariate Hotelling's T<sup>2</sup> control chart based on kernel density estimation for intrusion detection system
58
Analysing performance issues of open-source intrusion detection systems in high-speed networks
59
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
60
Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system
61
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
62
Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)
63
Model of the intrusion detection system based on the integration of spatial-temporal features
64
A real-time alert correlation method based on code-books for intrusion detection systems
65
Efficient behaviour specification and bidirectional gated recurrent units-based intrusion detection method for industrial control systems
66
Wireless sensor network intrusion detection system based on MK-ELM
67
A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
68
A survey on intrusion detection system for software defined networks (SDN)
69
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
70
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
71
An Improved Feedforward Neural Network Using Salp Swarm Optimization Technique for the Design of Intrusion Detection System for Computer Network
72
CNN-based person detection using infrared images for night-time intrusion warning systems
73
A Hybrid Approach for Intrusion Detection System
74
Machine Learning-Based Intrusion Detection System for Smart City
75
A novel mechanism for host-based intrusion detection system
76
Network intrusion detection system using random forest and decision tree machine learning techniques
77
A Study on Intrusion Detection System of Mobile Ad-hoc Networks
78
Performance evaluation of Snort and Suricata intrusion detection systems on Ubuntu server
79
CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System
80
Machine learning approach to detect intruders in database based on hexplet data structure
81
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
82
LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks
83
Assessment of Practice Management Entrustable Professional Activities by Pharmacists in North Dakota.
84
Miniscrew Implants for Intrusion of Supraerupted Molar: A Noninvasive Approach for Space Regaining.
85
Nonintrusive reduced order modeling framework for quasigeostrophic turbulence.
86
A nonintrusive adaptive reduced order modeling approach for a molten salt reactor system
87
A nonintrusive distributed reduced-order modeling framework for nonlinear structural mechanics—Application to elastoviscoplastic computations
88
A nonintrusive reduced order modelling approach using Proper Orthogonal Decomposition and locally adaptive sparse grids
89
Memory embedded non-intrusive reduced order modeling of non-ergodic flows
90
Three amino acid residues bind corn odorants to McinOBP1 in the polyembryonic endoparasitoid of Macrocentrus cingulum Brischke.
91
Rashnu: a Wi-Fi intrusion response scheme
92
Promoting the security of cloud computing using hybrid frameworks layer intrusion detection and neural network
93
Technological intrusion and communicative renewal: The case of two rural solar farm developments in the UK
94
Database intrusion detection technology based on vgg-svm
95
Web intrusion detection system combined with feature analysis and SVM optimization
96
A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks
97
Proof of stake for blockchain based distributed intrusion detecting system
98
To What Degree Are the 13 Entrustable Professional Activities Already Incorporated Into Physicians' Performance Schemas for Medical Students?
99
Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.
100
a novel feature extraction method for nonintrusive appliance load monitoring
101
a bayesian classification intrusion detection method based on the fusion of pca and lda