نتایج جستجو برای: ids 6012009

تعداد نتایج: 5339  

2013
Usha Banerjee K. V. Arya

Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on the performance and reliability of the IDS. Apart from the initial cost of procuring the ...

2002
Hein S. Venter

Any organisation connected to the Internet that is serious about security cannot be without an intrusion detection system (IDS) these days. Is one IDS sufficient to cover all possible vulnerabilities in a network? In a sea of security products available today, which IDS tool(s) will be sufficient for your organisation’s needs? The only way to find out is to compare various IDS tools with each o...

2016
Varghese Peter Marina Kalashnikova Aimee Santos Denis Burnham

Infant directed speech (IDS), the speech register adults use when talking to infants, has been shown to have positive effects on attracting infants' attention, language learning, and emotional communication. Here event related potentials (ERPs) are used to investigate the neural coding of IDS and ADS (adult directed speech) as well as their discrimination by both infants and adults. Two instanc...

2012
Ajoy Kumar Eduardo B. Fernandez

In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion or denial of service attacks. These intrusions may bring all kinds of misuses. Intrusion Detection Systems (IDS) play a very important role in the security of today's networks by detecting when an attack is happening. IDS have evolved into an integral part of network security which monitors the netwo...

2015
Ismail Butun In-ho Ra Ravi Sankar

In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster h...

1999
Roland Büschkes

This paper discusses solutions to protect the privacy of users during the application of intrusion detection systems (IDS) and introduces the notion of multilateral secure IDS. The surveillance of users by an IDS threatens their privacy. However, an IDS depends on data gathered by monitoring and must be able to unambiguously identify an intruder in case of an emergency. To mediate between the c...

2010
Nan Xu Denis Burnham

Vowel hyperarticulation in infant-directed speech (IDS) has been found consistently across both tone (Mandarin [1]) and non-tone (Russian, Swedish, American [2] and Australian English [3]) languages and has been posited as a possible bootstrapping mechanism for early language development in infancy [1]. Here we investigated (1) IDS in Cantonese to examine whether tones, like vowels, are hyperar...

2013
Kristine M. Yu Sameer ud Dowla Khan Megha Sundara

We examined the phonetics and phonology of intonation of infant-directed speech (IDS) and non-IDS in story-reading in two typologically-divergent languages, English and Bengali. In addition to finding an increase in f0 range and variability in IDS, replicating previous work on IDS prosody, we found novel evidence that f0 manipulations in IDS are constrained by intonational phonology. Speakers i...

2012
Jatinder Singh Rupinder Singh

Wireless Intrusion Detection System (IDS) performance metrics are used to measure the ability of a wireless IDS to perform a particular task and to fit within the performance constraints. These metrics measure and evaluate the parameters that impact the performance of a wireless IDS. Wireless IDS analyze wireless specific traffic including scanning for external users trying to connect to the ne...

2016
Azuan Ahmad Norbik Bashah Idris Mohd Nazri Kama

Cloud Computing Security is a new implementation of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with the implementation of existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید