منابع مشابه
On the danger of detecting network states in white noise
The general idea of nonstationarity of brain activity or dependence of the dynamics on some, potentially unobserved, temporally changing or fluctuating parameter, has been familiar in the neuroscience community in contexts such as sleep dynamics or epileptology for a long time. However, recently it has been attracting increasing attention in the context of functional brain network analysis. Thi...
متن کاملAsthma is a Serious Danger
میزان مرگ و میر آسم طی دهه گذشته بطور چشمگیری تغییر کرده است. با مبتلا کردن ۱۵ میلیون آمریکایی میزان مرگ و میر در سال ۱۹۷۸، به رقم ۱۸۷۲ نفر و ۹ سال بعد، به بیش از ۴۰۰۰ نفر رسید. علت چنین افزایش چشمگیری روشن نیست. علل احتمالی عبارتند از کاهش ظرفیت تنفس، استفاده بیش از حد از داروهای استثنائی و استنباط غلط بیماران و نیز مراکز درمانی نسبت به شدت بیماری است. بررسی دقیق، معالجات مناسب و آموزش به ب...
متن کاملDanger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm
There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are s...
متن کاملDetecting Sleep Deprivation Attack over MANET Using a Danger Theory –Based Algorithm
MANET is a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. This paper objective is to summarize different types of attacks over MANET, and concerns with studying sleep deprivation attack. Therefore, this pap...
متن کاملDetecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2012
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.336.6083.782-c