نتایج جستجو برای: dids

تعداد نتایج: 849  

2018
R. B. Benisha S. Raja Ratna

In this paper, attacks caused in the shut circle control system is discussed. To keep the net-worked control systems safe, good, ready and hard to move, getting NCS from of the net attacks is very important. The marked power of thought attackers will not move after any made suggestion copies made to scale, they keep on changing their attack designs as if by chance and dynamically. Distributed g...

2005
Ajith Abraham

Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known...

2009
Yifeng Zeng Prashant Doshi

Interactive dynamic influence diagrams (I-DIDs) are graphical models for sequential decision making in partially observable settings shared by other agents. Algorithms for solving I-DIDs face the challenge of an exponentially growing space of candidate models ascribed to other agents, over time. Previous approach for exactly solving IDIDs groups together models having similar solutions into beh...

2011
A. Rezk H. Ali M. El-Mikkawy S. Barakat

A database intrusion detection system (DIDS) is used to detect potential violations in database security. DIDS follows other traditional database security mechanisms and network security mechanisms such as firewall and network intrusion detection. Therefore, it faces the intrusion from internal users or the intrusion that can be passed through other security layers. This means that the number o...

2016
Ross Conroy Yifeng Zeng Jing Tang

Interactive dynamic influence diagrams (I-DIDs) provide an explicit way of modeling how a subject agent solves decision making problems in the presence of other agents in a common setting. To optimize its decisions, the subject agent needs to predict the other agents’ behavior, that is generally obtained by solving their candidate models. This becomes extremely difficult since the model space m...

2009
Yifeng Zeng Prashant Doshi

Interactive dynamic influence diagrams (I-DIDs) are graphical models for sequential decision making in partially observable settings shared by other agents. Algorithms for solving I-DIDs face the challenge of an exponentially growing space of candidate models ascribed to other agents, over time. Previous approach for exactly solving IDIDs groups together models having similar solutions into beh...

Journal: :CoRR 2017
Asem Othman John Callahan

Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...

2016
Ross Conroy Yifeng Zeng Marc Cavazza Jing Tang Yinghui Pan

Interactive dynamic influence diagrams (I-DIDs) are recognized graphical models for sequential multiagent decision making under uncertainty. They represent the problem of how a subject agent acts in a common setting shared with other agents who may act in sophisticated ways. The difficulty in solving I-DIDs is mainly due to an exponentially growing space of candidate models ascribed to other ag...

2003
H. Joiner

Deoxygenation-induced cation movements in sickle cells were inhibited 80% to 85% by the anion transport inhibitor, 4,4’-diisothiocyano-2,2’disulfostilbene (DIDS). Morphologic sickling was not altered by DlDS treatment, demonstrating that morphologic sickling was not sufficient to produce cation leaks in sickle cells. DlDS inhibition of deoxygenationinduced cation flux was not affected when Irep...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید