نتایج جستجو برای: ids

تعداد نتایج: 5339  

Journal: :Clinical chemistry 2006
Caroline J Dean Michelle R Bockmann John J Hopwood Doug A Brooks Peter J Meikle

BACKGROUND Mucopolysaccharidosis type II (MPS II) is a lysosomal storage disorder related to a deficiency in the enzyme iduronate-2-sulfatase (IDS). Clinical trials of enzyme replacement therapy are in progress, but effective treatment will require screening assays to enable early detection and diagnosis of MPS II. Our study evaluated the diagnostic accuracy of IDS protein and enzyme activity m...

Journal: :ACM Transactions on Internet Technology 2021

Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and power resources, has become an essential mechanism for resource management numerous applications. The growth of the volume variety data traffic on Internet leads to concerns robustness cyberphysical systems especially critical infrastructures. Therefore, i...

Journal: :CoRR 2014
Jianhang Gao Qing Zhao Ananthram Swami

We consider the problem of inferring the opinions of a social network through strategically sampling a minimum subset of nodes by exploiting correlations in node opinions. We first introduce the concept of information dominating set (IDS). A subset of nodes in a given network is an IDS if knowing the opinions of nodes in this subset is sufficient to infer the opinion of the entire network. We f...

2001
Peter Mell Donald Marks Mark McLarnon

As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...

2004
Ajith Abraham Ravi Jain Sugata Sanyal Sang-Yong Han

An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This paper evaluates three fuzzy rule based classifiers for IDS and the performance is compared with decision trees, support vector machines and linear genetic programming. Further, Soft Computing (SC) based IDS (SCIDS)...

2009
Michael Collins

IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally ignores both the context within which the IDS operates and the attacker’s own ability to adapt to IDS behavior. In this paper, we propose an alternative strategy for evaluating IDS based around multiple strategies. Each strategy defines how an attacker profits ...

2003
Masayuki Murakami Nakaji Honda Junji Nishino

The active learning method (ALM), proposed as a methodology of soft computing, simulates human learning and inferencing processes on the basis of fuzzy concepts. This paper presents a hardware implementation of ALM. ALM has processing engines called IDS, which are tasked with extracting useful information from a system subject to modeling. In realizing ALM in hardware, it will be desirable in t...

2006
Jinqiao Yu Y. V. Ramana Reddy Sumitra Reddy

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

Journal: :International Journal of Applied Research in Mechanical Engineering 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید