OALib 期刊
  OALib Journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721)是一本多合一的開源期刊,以同行評審的方式出版發行文章,其所涵蓋的研究領域多達311種領域。本刊發表的全部文章均可在期刊網站上免費閱讀、下載、引用和傳播。單篇文章出版費用為99美元。詳情請咨詢[email protected] 或 QQ: 3279437679。現在就去投稿!
               文章 | 目標與領域 | 讀者指南 | 編委 | 文章版面費檢索             


Mar 25, 2020Open    AccessArticle

Recurrent Neural Networks and Deep Neural Networks Based on Intrusion Detection System

The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion De-tection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to identify abnormal activities and behaviors. The reasons, including the uncertainty in searching for types of attacks and the increasing com-plexity of advanced cyber-attacks, IDS calls for the need for integration of meth-ods such as Dee...

Oct 09, 2019Open    AccessArticle

Car FAQ Assistant Based on BILSTM-Siamese Network

Bo Jin, Zhezhi Jin
With the development of artificial intelligence, the automatic question answering technology has been paid more and more attention. Along with the technology’s maturing, the problem is gradually exposed. This technique has several major difficulties. There is semantic recognition. How accurate are the answers to the questions? Because Chinese grammar is relatively complex. There are many diffe

Mar 19, 2018Open    AccessArticle

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

S. Y. Massamba, S. A. R. R. Cheikh
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re

Apr 23, 2015Open    AccessArticle

A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model

Yassine Khlifi, Adel Bessadok
The fast growth of the Internet proposes and offers several new applications and advanced services that has greatly and quickly innovated the educational environment. The platform of e- learning represents an attractive educational field where the acceptance or utilization progresses and more and more people are taking courses or training using this technology. Mainly, e-learning platform exploits Internet infrastructure which became location for illegal events and actions, especially exposed to...

Oct 22, 2014Open    AccessArticle

Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)

Amin Mohajer, Mohammad Hasan Hajimobini, Abbas Mirzaei, Ehsan Noori
Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. There are several architectures for embedding IDS in WSN. Due to Energy Limitation, in this paper we use a distributed architecture which activates intrusion detection system for limited number of nodes. For this purpose we select a secure set of nodes c...


Contact Us

[email protected]


微信:OALib Journal