نتایج جستجو برای: ids 6012009

تعداد نتایج: 5339  

Journal: :Homeopathy : the journal of the Faculty of Homeopathy 2013
S Farrer E S Baitson L Gedah C Norman P Darby R T Mathie

INTRODUCTION This investigation extends our previous dental data collection pilot study with the following main aims: to gain insight into the periodontal complaints that dentists in the UK treat using individualised homeopathic prescription; to record patient-assessed change in severity of treated complaint (acute or chronic); to determine periodontal pocket depth (PPD). MATERIALS AND METHOD...

2014
Chaminda Alocious Nasser Abouzakhar Hannan Xiao Bruce Christianson

Computer Network Security has become a critical and important issue due to ever increasing cybercrimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security agencies and other militarily related organizations are highly concerned about the confidentiality and access control of the stored data. Therefore, it is really important to i...

2012
Rafael Páez

Intrusion Detection Systems (IDS) are software or hardware products that automate the analysis process of traffic on a network or a host. and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. Accordingly to its location, the IDS must be parameterized in a different way, for e...

Journal: :iranian journal of fuzzy systems 2014
mohammad reza moosavi mahsa fazaeli javan mohammad hadi sadreddini mansoor zolghadri jahromi

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

2015

An intrusion detection system (IDS) is a device or application that monitors all Host based IDS refers to intrusion detection that takes place on a single host. Host-based Intrusion Detection System (HIDS) and File Integrity Monitoring (FIM) policy violations, vulnerable software, or suspicious communications. An IDS can be a piece of installed software or a physical appliance Host intrusion de...

Journal: :Computer Networks 2000
Peter Mell Donald G. Marks Mark McLarnon

As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...

2013
S. H. Mortazavi P. S. Avadhani

This paper is discussed the security of computer networks is a concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase security of IDS for companies and homes, where information property are shared continually, security is of the nature.. Cryptography is seen as a major instrumentation in the line of defense of network security. This pape...

2012
Björn-C. Bösch

Intrusion Detection Systems (IDS) are very important to protect important services against malicious actions. Detailed knowledge of information processing and protocols are necessary to protect the services and systems sufficient against attacks. IDS are currently independent and coexisting solutions. Each single IDS requires its individual administration access, administration handling and man...

Journal: :Decision Support Systems 2006
Dong-Ling Xu Grace McCarthy Jian-Bo Yang

In this paper, it is described how a multiple criteria decision analysis software tool, the Intelligent Decision System (IDS), can be used to help business self-assessment. Following a brief outline of a model for assessing business innovation capability and the IDS software, the process of using IDS to implement different types of assessment questions is discussed. It is demonstrated that IDS ...

Journal: :International Journal of Security and Its Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید