نتایج جستجو برای: danger theory
تعداد نتایج: 795516 فیلتر نتایج به سال:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
Muslims in France: Identifying a Discriminatory Equilibrium We analyze the assimilation patterns of Muslim immigrants in Western countries with a unique identification strategy. Survey and experimental data collected in France in 2009 reveal that Muslims and rooted French are locked in a sub-optimal equilibrium whereby (i) rooted French exhibit taste-based discrimination against those they are ...
Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of wh...
One of the most important topics in the field of intrusion detection systems is to find a solution to reduce the overwhelming alerts generated by IDSs in the network. Inspired by danger theory which is one of the most important theories in artificial immune system (AIS) we proposed a complementary subsystem for IDS which can be integrated into any existing IDS models to aggregate the alerts in ...
Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to c...
Large fluctuations of conductivity with time are observed in a low-mobility twodimensional electron system in silicon at low electron densities ns and temperatures. A dramatic increase of the noise power (∝ 1/fα) as ns is reduced below a certain density ng, and a sharp jump of α at ns ≈ ng, are attributed to the freezing of the electron glass at ns = ng. The data strongly suggest that glassy dy...
AIS-based anomaly detection systems classically utilize the paradigm of self/non-self discrimination. In this approach, an algorithm learns self during a learning phase, therefore, such algorithms do not have the ability to cope with scenarios in which self is continuously changing with time. This situation is encountered once malicious nodes are to be detected in a Mobile Ad Hoc Network (MANET...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید