نتایج جستجو برای: ids
تعداد نتایج: 5339 فیلتر نتایج به سال:
BACKGROUND Mucopolysaccharidosis type II (MPS II) is a lysosomal storage disorder related to a deficiency in the enzyme iduronate-2-sulfatase (IDS). Clinical trials of enzyme replacement therapy are in progress, but effective treatment will require screening assays to enable early detection and diagnosis of MPS II. Our study evaluated the diagnostic accuracy of IDS protein and enzyme activity m...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and power resources, has become an essential mechanism for resource management numerous applications. The growth of the volume variety data traffic on Internet leads to concerns robustness cyberphysical systems especially critical infrastructures. Therefore, i...
We consider the problem of inferring the opinions of a social network through strategically sampling a minimum subset of nodes by exploiting correlations in node opinions. We first introduce the concept of information dominating set (IDS). A subset of nodes in a given network is an IDS if knowing the opinions of nodes in this subset is sufficient to infer the opinion of the entire network. We f...
As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This paper evaluates three fuzzy rule based classifiers for IDS and the performance is compared with decision trees, support vector machines and linear genetic programming. Further, Soft Computing (SC) based IDS (SCIDS)...
IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally ignores both the context within which the IDS operates and the attacker’s own ability to adapt to IDS behavior. In this paper, we propose an alternative strategy for evaluating IDS based around multiple strategies. Each strategy defines how an attacker profits ...
The active learning method (ALM), proposed as a methodology of soft computing, simulates human learning and inferencing processes on the basis of fuzzy concepts. This paper presents a hardware implementation of ALM. ALM has processing engines called IDS, which are tasked with extracting useful information from a system subject to modeling. In realizing ALM in hardware, it will be desirable in t...
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید