نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :Journal of speech, language, and hearing research : JSLHR 2013
Susie Robertson Deborah von Hapsburg Jessica S Hay

PURPOSE Infant-directed speech (IDS) facilitates language learning in infants with normal hearing, compared to adult-directed speech (ADS). It is well established that infants with normal hearing prefer to listen to IDS over ADS. The purpose of this study was to determine whether infants with hearing impairment (HI), like their NH peers, show a listening preference for IDS over ADS. METHOD A ...

Journal: :Computers & Electrical Engineering 2009
M. Ali Aydin A. Halim Zaim K. Gökhan Ceylan

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known a...

2012
Anna J. Esbensen Sigan L. Hartley

It is well established that individuals with intellectual disabilities (IDs) suffer from mood disorders. Individuals with IDs present with a similar set of depressive behaviors, including dysfunctional cognitive deficits similar to individuals without IDs such as having a low self-concept, attending to negative features of an event, and making negative causal attributions for stressful events (...

2001
Samuel Patton William Yurcik David Doss

We report a vulnerability to network signature-based IDS which we have tested using Snort and we call “Squealing”. This vulnerability has significant implications since it can easily be generalized to any IDS. The vulnerability of signature-based IDS to high false positive rates has been welldocumented but we go further to show (at a high level) how packets can be crafted to match attack signat...

2015
Shahin Ara Begum

An intrusion detection system (IDS) is used to manage network traffic and monitors for suspicious activity and alerts the system or network administrator. One of the major properties of IDS is to respond for anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS can identify threats in various ways: 1) it detects specific s...

2012
Amin Hassanzadeh Zhaoyan Xu Radu Stoleru Guofei Gu

As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing and memory). Cooperativ...

2005
Frédéric Massicotte Mathieu Couture Yvan Labiche

Intrusion Detection Systems (IDS) use different techniques to reduce the number of false positives they generate. Simple network context information such as the communication session state has been added in IDS signatures to only raise alarms in the proper context. However, this is often not sufficient and more network context information needs to be added to these Stateful IDS (SIDS) signature...

2014
Amit kumar Sahu Chinmay Bhatt Shrikant Lade

Countless have been proposed on intrusion detection system, which prompts the execution of executor based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS and so on. While building such IDS models, taking in calculations from stream of system movement assume essential part in precision of IDS frameworks. The proposed work concentrates on actualizing the novel strategy t...

2010
Philippe Owezarski

This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as realistic as possible and reproducible, i.e. it works with real attacks and real traffic in controlled environments. It especially relies on a database containing attack traces specifically created for that evaluation ...

2005
IN AN MAREK PIOTR ZIELINSKI

Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection funct...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید