نتایج جستجو برای: ids assessment
تعداد نتایج: 566100 فیلتر نتایج به سال:
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
In this paper we present an Interactive Digital Storytelling (IDS) formalisation that captures the IDS logic constraints. This was implemented in a game engine and an authoring tool was created to facilitate the development of IDS based games. We created several IDS based games using the proposed engine and authoring tool. They were used as case studies in this research. We also present some of...
We first analyze the integrated density of states (IDS) of periodic Schrödinger operators on an amenable covering manifold. A criterion for the continuity of the IDS at a prescribed energy is given along with examples of operators with both continuous and discontinuous IDS’. Subsequently, alloy-type perturbations of the periodic operator are considered. The randomness may enter both via the pot...
This paper is a survey of the work, done for making an IDS fault tolerant. IDS are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subv...
Interdigitated dielectrometry sensors (IDS) are capacitive sensors investigated to precisely measure the relative permittivity ( ϵ r ) of insulating liquids. Such liquids used in the power industry exhibit a change in ϵ r as they degrade. The IDS ability to measure ϵ r in-situ can potentially reduce maintenance, increase grid stability and improve safety. Noise from external electric field sour...
abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...
A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...
Nowadays one of the main problems of Intrusion Detection Systems (IDS) is the high rate of false positives that they show. The number of alerts that an IDS launches are clearly higher than the number of real attacks. This paper tries to introduce a measure of the IDS prediction skill in close relationship with these false positives. So the prediction skill of an IDS is then computed according t...
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید