نتایج جستجو برای: ids 6012009

تعداد نتایج: 5339  

2010
Philippe Owezarski

This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as realistic as possible and reproducible, i.e. it works with real attacks and real traffic in controlled environments. It especially relies on a database containing attack traces specifically created for that evaluation ...

2005
IN AN MAREK PIOTR ZIELINSKI

Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection funct...

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

2011
Kamaruzaman Maskat Mohd Afizi Mohd Shukran Mohammad Adib Khairuddin Mohd Rizal Mohd Isa

Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could only detect the intrusion but could not, on its ...

Journal: :CoRR 2012
N. Ugtakhbayar D. Battulga Shirmen Sodbileg

Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network...

Journal: :Computers & Security 2014
Amin Hassanzadeh Radu Stoleru Michalis Polychronakis Geoffrey G. Xie

Due to the recent increased interest in wireless mesh networks (WMN), their security challenges have become of paramount importance. An important security mechanism for WMN, intrusion detection, has received considerable attention from the research community. Recent results show that traditional monitoring mechanisms are not applicable to real-worldWMN due to their constrained resources (memory...

Journal: :Ear and hearing 2011
Weiyi Ma Roberta Michnick Golinkoff Derek Houston Kathy Hirsh-Pasek

Infant-directed speech (IDS), compared with adult-directed speech (ADS), is characterized by a slower rate, a higher fundamental frequency, greater pitch variations, longer pauses, repetitive intonational structures, and shorter sentences. Despite studies on the properties of IDS, there is no direct demonstration of its effects for word learning in infants. This study examined whether 21- and 2...

2013
Amin Hassanzadeh Zhaoyan Xu Radu Stoleru Guofei Gu Michalis Polychronakis

As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing power and memory). Coop...

Journal: :Journal of bone and mineral research : the official journal of the American Society for Bone and Mineral Research 2011
Etienne Cavalier Véronique Huberty Catherine Cormier Jean-Claude Souberbielle

We have recently observed an increasing number of patients presenting very high serum levels of 25-hydroxyvitamin D [25(OH)D] (> 150 ng/mL), which, in all cases, had been measured with the IDS EIA kit adapted on different "open" automated platforms. We performed a comparison between the IDS EIA kit adapted on two different "open"automated platforms and the DiaSorin RIA. We found a systematic bi...

2004
Darko Kirovski Nebojsa Jojic Gavin Jancke

We present FaceCerts, a simple, inexpensive, and cryptographically secure identity certification system. A FaceCert is a printout of person’s portrait photo, an arbitrary textual message, and a 2-D color barcode which encodes an RSA signature of the message hash and the compressed representation of the face encompassed by the photo. The signature is created using the private key of the party is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید