نتایج جستجو برای: host based intrusion detection
تعداد نتایج: 3501797 فیلتر نتایج به سال:
With the emergence of global connectivity with expansion of computer networks during the past decade, security threats in network have become a crucial issue for computer systems. Nowadays, it is very important to retain a high level security to ensure safe and trusted communication for information exchange across the network. Different softcomputing based methods and tools have been proposed i...
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the most security-conscious server administrators. Consequently, web servers are a popular target for hackers. To mitigate the security exposure associated with web servers, intrusion detection systems are deployed to anal...
Can you hear me? acoustic modifications in speech directed to foreigners and hearing-impaired people
People modify their voice to accommodate the communicative needs of their audience. Previously, speech recipient groups with communicative needs such as foreigners and infants have been investigated, however, there is a lack of research into speech directed to hearing-impaired people. The aim of our study was to investigate prosodic modifications in speech directed to hearing-impaired people an...
Patients and methods Fifteen patients with HIDS were recruited across US, Europe and Australia. They completed a 20 page pre-interview questionnaire and an in-depth 90 minute in-home interview. Patient responses were recorded and summarized; for patients with complete data available (n=13), responses were quantified. The topics covered in the interview were symptoms, patient journey, and unmet ...
In the area of intrusion detection the misuse detection approach assumes that relevant activity violating security policies is known a priori and it provides for fast intrusion detection with low false alarm rate, thereby complementing the anomaly detection approach. Hence, misuse detection is an indispensable ingredient to a suitable strategy for intrusion detection. Misuse detection calls for...
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
* Corresponding author. This work is supported by the National Natural Science Foundation of China under Grant 60303012 Abstract: In recent years, intrusion detection has emerged as an important technique for network security. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, to optimize the performance of intrusion detection syste...
The use of computer more and more need to be increase the security day by day in a real world, the process of monitoring the computer system in a secure way for an unknown and known attack increase the availability and confidentiality of the system, the system provides the solution of such a problem is known as an Intrusion detection system. Intrusion detection systems play a vital role in netw...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید