نتایج جستجو برای: drug misuses
تعداد نتایج: 590094 فیلتر نتایج به سال:
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning tasks on operating system call sequences of normal and abnormal (intrusion) executions of the Unix...
Existing security standards targets qualitative evaluation of the security level of a system against a set of predefined levels. When doing trade-off between treatment strategies, we need to supplement the qualitative evaluation with quantitative estimates of operational security. Quantitative evaluation, such as probabilistic analysis, is frequently used within the dependability domain. To est...
Network forensics is the critical next step in the analysis of network attacks, intrusions, and misuses. It is the forensic process that will aid identification of what occurred and how. With the explosion in numbers and types of attacks it is critical that new techniques be developed to aid in the analysis of said attacks. For instance, with the recent widespread deployment of botnets, it is f...
Im draws a parallel between the neurobiology of individuals with autism spectrum disorder (ASD) and that of trauma survivors, to explain why individuals with ASD may be more vulnerable to trauma as a risk factor for violence. This commentary raises questions about how we use this information in a forensic context, including its potential misuses. It urges caution in not overstating the data bef...
In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive activity before system damage is perpetrated is to detect misuse of privileged programs in real-time. In this paper, we describe three machine learning algorithms that learn the normal behavior of programs running on the Solaris ...
Discovery Unmanned Aerial Systems/UAS is used in various fields such as reconnaissance tools, topological mapping, and recreational purposes. This must be balanced with legal arrangements because there are many misuses of UAS operations. Act No. 1 2019 concerning Aviation, which the umbrella for aviation Indonesia, does not mention term UAS. writing aims to explain urgency changing 2009 regardi...
background: adverse cutaneous drug reactions (acdrs) are the most commonly reported adverse drug events. the causative drugs and clinical patterns of acdrs are different in various populations. this study was conducted to identify the clinical patterns, causative drugs and reasons for drug administration in patients hospitalized due to acdr. materials and methods: this retrospective study was c...
In this article, we raise awareness about the misuses of frequently invoked criteria for structure making/breaking phenomena, resulting from absence any explicit cause–effect relationship between proposed markers and microstructural perturbation solvent induced by solute. First, support our assessment with rigorous molecular-based foundations to determine, directly quantitatively, solute-induce...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید