نتایج جستجو برای: ids

تعداد نتایج: 5339  

2013
Nilanjana Pradhan

A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...

2003
Agustín Orfila Javier Ignacio Carbó Rubiera Arturo Ribagorda

Nowadays one of the main problems of Intrusion Detection Systems (IDS) is the high rate of false positives that they show. The number of alerts that an IDS launches are clearly higher than the number of real attacks. This paper tries to introduce a measure of the IDS prediction skill in close relationship with these false positives. So the prediction skill of an IDS is then computed according t...

Journal: :Computers & Security 2009
Zonghua Zhang Pin-Han Ho Liwen He

Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

Journal: :Future Generation Comp. Syst. 2013
Álvaro Herrero Martí Navarro Emilio Corchado Vicente Julián

This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control. One of its main goals is to facilitate real-time Intrusion Detection, as accurate and swift responses are crucial in this field, especially if automatic abortion mechanisms are running. The formulation of this hybrid IDS combines Artificial Neural Networks ...

2012
Ok Jeong Lee Su-Jin Kim Young Bae Sohn Hyung-Doo Park Soo-Youn Lee Chi-Hwa Kim Ah-Ra Ko Yeon-Joo Yook Su-Jin Lee Sung Won Park Se-Hwa Kim Sung-Yoon Cho Eun-Kyung Kwon Sun Ju Han Dong-Kyu Jin

PURPOSE Mucopolysaccharidosis type II (MPS II or Hunter syndrome) is a rare lysosomal storage disorder caused by iduronate-2-sulfatase (IDS) deficiency. MPS II causes a wide phenotypic spectrum of symptoms ranging from mild to severe. IDS activity, which is measured in leukocyte pellets or fibroblasts, was reported to be related to clinical phenotype by Sukegawa-Hayasaka et al. Measurement of r...

Journal: :Neuropsychiatric Disease and Treatment 2006
Ira H Bernstein A John Rush Thomas J Carmody Ada Woo Madhukar H Trivedi

BACKGROUND: Both the clinician (IDS-C(30)) and self-report (IDS-SR(30)) versions of the 30-item Inventory of Depressive Symptomatology have acceptable psychiatric properties and have been used in various clinical studies. These two scales, however, have not been compared using item response theory (IRT) methods to determine whether the standard scoring methods are optimal. METHODS: Data were de...

Journal: :Information Systems Research 2005
Huseyin Cavusoglu Birendra K. Mishra Srinivasan Raghunathan

T increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of the...

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید