نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

2013
Raphaël Jamet Pascal Lafourcade

To secure Wireless Ad-hoc Networks (WANET) against malicious behaviors, three components are needed: prevention, detection, and response. In this paper, we focus on Intrusion Detection Systems (IDS) for WANET. We classify the different inputs used by the decision process of these IDS, according to their level of cooperation, and the source of their data. We then propose a decision aid which all...

Journal: :IJCSA 2005
Agustín Orfila Javier Ignacio Carbó Rubiera Arturo Ribagorda

Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS and its optimal operation point depend not only on the Hit and False alarm rates but also on costs (such as those associated with making incorrect decisions about detection) and the hostility of the operating environment. An adaptive multiagent IDS is proposed in this paper and it is evaluated acc...

2006
Kuo Zhao Liang Hu Guannan Gong Meng Zhang Kexin Yang

Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statistics are introduced to the procedure of data collection for IDS, and formulas used to calculate the sample size of packets based on these sampling techniques are presented. The implementation of packets sampling is provi...

2017
Okko Johannes Räsänen Sofoklis Kakouros Melanie Soderstrom

The exaggerated intonation and special rhythmic properties of infant-directed speech (IDS) have been hypothesized to attract infant’s attention to the speech stream. However, studies investigating IDS in the context of models of attention are few. A number of such models suggest that surprising or novel perceptual inputs attract attention, where novelty can be operationalized as the statistical...

2012
Kanubhai K. Patel Bharat V. Buddhadev

Received Nov 4 th , 2012 Revised Dec 19 th , 2012 Accepted Dec 22 th , 2012 Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is an essential element of any contemporary information system. There are mainly two techniques for intrusion detection: i) misuse (signature-based) detection and ii) anomal...

Journal: :Neurocomputing 2009
Álvaro Herrero Emilio Corchado María A. Pellicer Ajith Abraham

A novel hybrid artificial intelligent system for Intrusion Detection, called MOVIH-IDS, is presented in this study. A hybrid model built by means of a multiagent system that incorporates an unsupervised connectionist Intrusion Detection System (IDS) has been defined to guaranty an efficient computer network security architecture. This hybrid IDS facilitates the intrusion detection in dynamic ne...

2001
Y. Xiang

In uence diagrams (IDs) provide a concise graphical formulation for decision making in intelligent agents. In this work, we propose a simple method to evaluate IDs by rst converting IDs into BNs and then applying a junction tree-based inference algorithm. The methods are more e cient than methods in [1, 5] and are simpler than [6]. (

Journal: :Brain research 2000
H Nallet E T MacKenzie S Roussel

Transient ischaemic depolarizations (IDs) are thought to play a key role in the pathogenesis of focal cerebral ischaemia. Most transient IDs are akin to spreading depression (SD), although a negative DC shift is not observed in half the cases. The other IDs may represent transient anoxic depolarizations. Using cortical DC and blood flow recordings, following middle cerebral artery occlusion in ...

1992
Murali Subbarao Ming-Chin Lu

A computer model is presented for the formation and sensing of defocused images in a typical CCD camera system. A computer simulation system named IDS has been developed based on the computer model. IDS takes as input the camera parameters and the scene parameters. It produces as output a digital image of the scene as sensed by the camera. IDS consists of a number of distinct modules each imple...

2013
Pavitra Chauhan Nidhi Chandra

With the growing advances in the technology the uses of computer systems and the internet is also growing at a rapid rate, and with the increase in their usage vulnerabilities and threats are also increasing tremendously. A large number of approaches have been proposed till now for improving the security of a host system and a network. One of the proposed approach is an Intrusion Detection Syst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید