نتایج جستجو برای: ids

تعداد نتایج: 5339  

Journal: :CoRR 2013
Nils Ulltveit-Moe Vladimir A. Oleshchuk

This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis sho...

Journal: :Inf. Manag. Comput. Security 2012
Teodor Sommestad Amund Hunstad

When system administrators monitor the security of computer network(s) they often use an intrusion detection system (IDS). The IDS examines events (in network traffic, operating systems, etc.) and raises an alarm if the events are believed to be symptoms of an intrusion. A number of studies investigate IDSs from a technical perspective. These studies typically investigate the technical quality ...

2015
Agnieszka Czoska Katarzyna Klessa Maciej Karpinski

Infant-directed speech (IDS) is reported to differ significantly from adult-directed speech (ADS) in its acoustic-phonetic properties. In IDS, phonetic features of individual speech sounds tend to be intensified [6, 14, 20]. An example phenomenon documented for IDS in several languages is vowel hyperarticulation [25]. Thus, the formant frequency values (F1, F2) vary in the two target speaking s...

2004
Kenichi Kourai Shigeru Chiba Toshio Hirotsu Toshiharu Sugawara

Due to the nature that a distributed IDS has to monitor the whole distributed system, the IDSes constructing a distributed IDS are scattered throughout hosts in the distributed system. In addition, each IDS is embedded into a host and a network in the distributed system. As such, the distributed IDSes are not separated from the distributed system and therefore cause a security problem. A distri...

Journal: :Journal of child language 2010
Sue Ann S Lee Barbara L Davis

This study compared segmental distribution patterns for consonants and vowels in English infant-directed speech (IDS) and adult-directed speech (ADS). A previous study of Korean indicated that segmental patterns of IDS differed from ADS patterns (Lee, Davis & MacNeilage, 2008). The aim of the current study was to determine whether such differences in Korean are universal or language-specific. R...

Journal: :Psychological review 2016
Baxter S. Eaves Naomi Feldman Thomas L. Griffiths Patrick Shafto

Infant-directed speech (IDS) has distinctive properties that differ from adult-directed speech (ADS). Why it has these properties-and whether they are intended to facilitate language learning-is a matter of contention. We argue that much of this disagreement stems from lack of a formal, guiding theory of how phonetic categories should best be taught to infantlike learners. In the absence of suc...

2016
Baxter S. Eaves Naomi H. Feldman Thomas L. Griffiths Patrick Shafto

Infant-directed speech (IDS) has distinctive properties that differ from adult-directed speech (ADS). Why it has these properties—and whether they are intended to facilitate language learning—is a matter of contention. We argue that much of this disagreement stems from lack of a formal, guiding theory of how phonetic categories should best be taught to infantlike learners. In the absence of suc...

2014
Álvaro Herrero Martí Navarro Emilio Corchado Vicente Julián

This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control. One of its main goals is to facilitate real-time Intrusion Detection, as accurate and swift responses are crucial in this field, especially if automatic abortion mechanisms are running. The formulation of this hybrid IDS combines Artificial Neural Networks ...

2003
Zhang Jian Ding Yong Gong Jian

Current IDSs usually have several shortcomings. First, the speed and sensitivity of detection are not so ideal. Secondly, the response system lacks the ability to correct errors. Thirdly, the cost of intrusion detection is not considered, that is, the response policy is static. This paper applies fuzzy default theory to transform reasoning and response engine of IDS, based on the proving of IDS...

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید