نتایج جستجو برای: drug misuses

تعداد نتایج: 590094  

1997
Wenke Lee Salvatore J. Stolfo Philip K. Chan

In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning tasks on operating system call sequences of normal and abnormal (intrusion) executions of the Unix...

2005
Siv Hilde Houmb Geri Georg Robert France Raghu Reddy James Bieman

Existing security standards targets qualitative evaluation of the security level of a system against a set of predefined levels. When doing trade-off between treatment strategies, we need to supplement the qualitative evaluation with quantitative estimates of operational security. Quantitative evaluation, such as probabilistic analysis, is frequently used within the dependability domain. To est...

2006
Robert F. Erbacher Amanda Sundberg

Network forensics is the critical next step in the analysis of network attacks, intrusions, and misuses. It is the forensic process that will aid identification of what occurred and how. With the explosion in numbers and types of attacks it is critical that new techniques be developed to aid in the analysis of said attacks. For instance, with the recent widespread deployment of botnets, it is f...

Journal: :The journal of the American Academy of Psychiatry and the Law 2016
Lori L Hauser

Im draws a parallel between the neurobiology of individuals with autism spectrum disorder (ASD) and that of trauma survivors, to explain why individuals with ASD may be more vulnerable to trauma as a risk factor for violence. This commentary raises questions about how we use this information in a forensic context, including its potential misuses. It urges caution in not overstating the data bef...

2000
Anup K. Ghosh Christoph C. Michael Michael Schatz

In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive activity before system damage is perpetrated is to detect misuse of privileged programs in real-time. In this paper, we describe three machine learning algorithms that learn the normal behavior of programs running on the Solaris ...

Journal: :JCH : Jurnal Cendekia Hukum 2022

Discovery Unmanned Aerial Systems/UAS is used in various fields such as reconnaissance tools, topological mapping, and recreational purposes. This must be balanced with legal arrangements because there are many misuses of UAS operations. Act No. 1 2019 concerning Aviation, which the umbrella for aviation Indonesia, does not mention term UAS. writing aims to explain urgency changing 2009 regardi...

Journal: :journal of research in medical sciences 0
fatemeh mokhtari zahra nikyar bahareh abtahi naeini alireza asemi esfahani siamak rahmani

background: adverse cutaneous drug reactions (acdrs) are the most commonly reported adverse drug events. the causative drugs and clinical patterns of acdrs are different in various populations. this study was conducted to identify the clinical patterns, causative drugs and reasons for drug administration in patients hospitalized due to acdr. materials and methods: this retrospective study was c...

Journal: :Liquids 2022

In this article, we raise awareness about the misuses of frequently invoked criteria for structure making/breaking phenomena, resulting from absence any explicit cause–effect relationship between proposed markers and microstructural perturbation solvent induced by solute. First, support our assessment with rigorous molecular-based foundations to determine, directly quantitatively, solute-induce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید