نتایج جستجو برای: پایگاه داده nsl kdd

تعداد نتایج: 219169  

2012
Kin Chung Lam Friederike Mühlpfordt Juan M. Vaquerizas Sunil Jayaramaiah Raja Herbert Holz Nicholas M. Luscombe Thomas Manke Asifa Akhtar

MOF is the major histone H4 lysine 16-specific (H4K16) acetyltransferase in mammals and Drosophila. In flies, it is involved in the regulation of X-chromosomal and autosomal genes as part of the MSL and the NSL complexes, respectively. While the function of the MSL complex as a dosage compensation regulator is fairly well understood, the role of the NSL complex in gene regulation is still poorl...

Journal: :The EMBO journal 1998
F S Wouters P I Bastiaens K W Wirtz T M Jovin

The fate of fluorescently labeled pre-nsL-TP (Cy3-pre-nsL-TP) microinjected into BALB/c 3T3 fibroblasts was investigated by confocal laser scanning microscopy. The protein exhibited a distinct punctate fluorescence pattern and colocalized to a high degree with the immunofluorescence pattern for the peroxisomal enzyme acyl-CoA oxidase. Proteolytic removal of the C-terminal leucine of the putativ...

Journal: :International Journal of Computational Intelligence Systems 2023

Abstract Intrusion detection systems get more attention to secure the computers and network systems. Researchers propose different intrusion using machine learning techniques. However, massive amount of data that contain irrelevant redundant features is still challenging The redundancy irrelevance may slow processing time decrease prediction performance. This paper proposes a Heterogeneous Ense...

Journal: :International Journal of Digital Crime and Forensics 2021

In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks virtual network (VCN) are increased. The protection VCN is required maintain faith users. Intrusion detection essential secure any network. existing approaches that use conventional neural cannot utilize all information identifying intrusions. paper, anomaly-based NIDS proposed. For...

Journal: :International Journal of Advanced Computer Science and Applications 2021

Internet of Things (IoT) has transcended from its application in traditional sensing networks such as wireless and radio frequency identification to life-changing critical applications. However, IoT are still vulnerable threats, attacks, intrusions, other malicious activities. Intrusion Detection Systems (IDS) that employ unsupervised learning techniques used secure sensitive data transmitted o...

Journal: :Journal of Sensors 2022

Cyber security is a fundamental challenge to the Internet of things (IoT) and smart home environments .This paper presents modified method ystem (IDS).setection dntrusion ienhance performance This modification achieved by introducing an alternative feature selection (FS) . ptimizer (GTO) algorithm.oroops torilla gmodel based on Recently, FS has played significant role in increasing detection an...

Journal: :FEBS letters 1992
B C Ossendorp T B Geijtenbeek K W Wirtz

The cDNA encoding the precursor form of non-specific lipid-transfer protein (pre-nsL-TP) from rat liver was cloned into the expression vector pET3d. The resulting plasmid was transformed to the Escherichia coli strain BL21(DE3). After induction of the bacteria with isopropyl-beta-D-thiogalactopyranoside (IPTG) pre-nsL-TP was purified from the bacterial lysate by anion exchange chromatography fo...

Journal: :Sakarya university journal of computer and information sciences 2021

The world has witnessed a fast-paced digital transformation in the past decade, giving rise to all-connected environments. While increasingly widespread availability of networks benefited many aspects our lives, providing necessary infrastructure for smart autonomous systems, it also created large cyber attack surface. This made real-time network intrusion detection significant component any co...

Journal: :International Journal of Information Security and Privacy 2023

The potential of machine learning mechanisms played a key role in improving the intrusion detection task. However, other factors such as quality data, overfitting, imbalanced problems, etc. may greatly affect performance an intelligent system (IDS). To tackle these issues, this paper proposes novel learning-based IDS called i-2NIDS. novelty approach lies application nested cross-validation meth...

Journal: :International Journal of Digital Crime and Forensics 2021

The present era is being dominated by cloud computing technology which provides services to the users as per demand over internet. Satisfying needs of huge people makes prone activities come up a threat. Intrusion detection system (IDS) an effective method providing data security information stored in works analyzing network traffic and informs case any malicious activities. In order control hi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید