نتایج جستجو برای: مدل ids
تعداد نتایج: 125300 فیلتر نتایج به سال:
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could only detect the intrusion but could not, on its ...
Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network...
Due to the recent increased interest in wireless mesh networks (WMN), their security challenges have become of paramount importance. An important security mechanism for WMN, intrusion detection, has received considerable attention from the research community. Recent results show that traditional monitoring mechanisms are not applicable to real-worldWMN due to their constrained resources (memory...
Infant-directed speech (IDS), compared with adult-directed speech (ADS), is characterized by a slower rate, a higher fundamental frequency, greater pitch variations, longer pauses, repetitive intonational structures, and shorter sentences. Despite studies on the properties of IDS, there is no direct demonstration of its effects for word learning in infants. This study examined whether 21- and 2...
As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing power and memory). Coop...
We have recently observed an increasing number of patients presenting very high serum levels of 25-hydroxyvitamin D [25(OH)D] (> 150 ng/mL), which, in all cases, had been measured with the IDS EIA kit adapted on different "open" automated platforms. We performed a comparison between the IDS EIA kit adapted on two different "open"automated platforms and the DiaSorin RIA. We found a systematic bi...
We present FaceCerts, a simple, inexpensive, and cryptographically secure identity certification system. A FaceCert is a printout of person’s portrait photo, an arbitrary textual message, and a 2-D color barcode which encodes an RSA signature of the message hash and the compressed representation of the face encompassed by the photo. The signature is created using the private key of the party is...
There is extensive evidence for vowel hyperarticulation in infant-directed speech (IDS) [1, 2, 3], but little is known about lexical tones in tonal IDS. Here, longitudinal recordings of Cantonese IDS revealed that tones, like vowels, are hyperarticulated. Implications of this finding for infant linguistic development are discussed.
BACKGROUND AND PURPOSE Several studies have reported associations between brain iron deposits (IDs), white matter hyperintensities (WMHs) and cognitive ability in older individuals. Whether the association between brain IDs and cognitive abilities in older people is mediated by or independent of total brain tissue damage represented by WMHs visible on structural magnetic resonance imaging (MRI)...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید