نتایج جستجو برای: ids
تعداد نتایج: 5339 فیلتر نتایج به سال:
A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...
Nowadays one of the main problems of Intrusion Detection Systems (IDS) is the high rate of false positives that they show. The number of alerts that an IDS launches are clearly higher than the number of real attacks. This paper tries to introduce a measure of the IDS prediction skill in close relationship with these false positives. So the prediction skill of an IDS is then computed according t...
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control. One of its main goals is to facilitate real-time Intrusion Detection, as accurate and swift responses are crucial in this field, especially if automatic abortion mechanisms are running. The formulation of this hybrid IDS combines Artificial Neural Networks ...
PURPOSE Mucopolysaccharidosis type II (MPS II or Hunter syndrome) is a rare lysosomal storage disorder caused by iduronate-2-sulfatase (IDS) deficiency. MPS II causes a wide phenotypic spectrum of symptoms ranging from mild to severe. IDS activity, which is measured in leukocyte pellets or fibroblasts, was reported to be related to clinical phenotype by Sukegawa-Hayasaka et al. Measurement of r...
BACKGROUND: Both the clinician (IDS-C(30)) and self-report (IDS-SR(30)) versions of the 30-item Inventory of Depressive Symptomatology have acceptable psychiatric properties and have been used in various clinical studies. These two scales, however, have not been compared using item response theory (IRT) methods to determine whether the standard scoring methods are optimal. METHODS: Data were de...
T increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of the...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید