نتایج جستجو برای: misuse detection

تعداد نتایج: 574962  

Journal: :international journal of high risk behaviors and addiction 0
abbas abbasi-ghahramanloo department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran akbar fotouhi department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran hojjat zeraati department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran afarin rahimi-movaghar iranian national center for addiction studies, iranian institute for reduction of high-risk behaviors, tehran university of medical sciences, tehran, ir iran; iranian national center for addiction studies, iranian institute for reduction of high-risk behaviors, tehran university of medical sciences, south karegar ave., p. o. box: 1336616357, tehran, ir iran. tel/fax: +98-2155412232

conclusions our results suggested that the prevalence of prescription drugs, alcohol and illicit substance use was relatively low, though still significant, among iranian students, which was strongly associated with family and friends’ use. the findings of this research can be used for planning and evaluating interventions by considering the risk factors and protective factors in universities. ...

Journal: :PVLDB 2011
Daniel Fabbri Kristen LeFevre

To comply with emerging privacy laws and regulations, it has become common for applications like electronic health records systems (EHRs) to collect access logs, which record each time a user (e.g., a hospital employee) accesses a piece of sensitive data (e.g., a patient record). Using the access log, it is easy to answer simple queries (e.g., Who accessed Alice’s medical record?), but this oft...

Journal: :CoRR 2004
Julie Greensmith Uwe Aickelin Jamie Twycross

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves ...

Journal: :Mini reviews in medicinal chemistry 2007
M Thevis W Schänzer

Preventive doping research includes the development of methods for the detection of new or emerging drugs to be implemented in routine screening analysis. Candidates with great potential for misuse in elite sports include selective androgen receptor modulators, growth hormone secretagogues, hypoxia-inducible factor stabilizers and erythropoietin mimetics.

2012
Juan C. Pelaez

An Intrusion Detection System (IDS) is an important evidence collection tool for network forensics analysis. An IDS operates by inspecting both inbound and outbound network activity and identifying suspicious patterns that may be indicative of a network attack. For each suspicious event, IDS software typically records information similar to statistics logged by firewalls and routers (e.g., date...

2009
Sebastian Schmerl Michael Vogel Hartmut König

Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined patterns. The matching rules are called signatures. The definition of signatures is up to now an empirical process based on expert knowledge and experience. The analysis success and accordingly the acceptance of intrus...

2016
Debasish Das Utpal Sharma D. K. Bhattacharyya

Web is one of the most popular internet services in today’s world. In today’s world, web servers and web based applications are the popular corporate applications and become the targets of the attackers. A Large number of Web applications, especially those deployed for companies to ebusiness operation involve high reliability, efficiency and confidentiality. Such applications are written in scr...

Journal: :Future Internet 2013
Matti Mantere Mirko Sailio Sami Noponen

The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for...

1999
Luc Girardin

Carefully logging network activity is essential to meet the requirements of high security and optimal resource availability. However, detecting break-in attempts within this activity is a difficult task. Making the distinction between misuse and normal use is hard, and identifying intrusions that use novel attacks is fundamentally difficult. In this paper, we introduce a visual approach for ana...

Journal: :Archives of internal medicine 2007
Sherry A McKee Tracy Falba Stephanie S O'Malley Jody Sindelar Patrick G O'Connor

BACKGROUND Screening for alcohol use in primary care settings is recommended by clinical care guidelines but is not adhered to as strongly as screening for smoking. It has been proposed that smoking status could be used to enhance the identification of alcohol misuse in primary care and other medical settings, but national data are lacking. Our objective was to investigate smoking status as a c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید