نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :Applied sciences 2023

Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such resource sharing, extensive connectivity, and agility deploying new applications pose security risks that are increasingly exploited. New technologies like container platforms require IDS to evolve effectively detect intrusive activities these ...

Journal: :Cancer Cell 2010

2013
Naoto Furukawa Yoshikazu Sasaki Aiko Shigemitsu Juria Akasaka Seiji Kanayama Ryuji Kawaguchi Hiroshi Kobayashi

OBJECTIVE In the present study, we evaluated changes in CA-125 cut-off values predictive of complete interval debulking surgery (IDS) after neoadjuvant chemotherapy (NAC) using receiver operating characteristic (ROC) analysis. METHODS This retrospective single-institution study included patients with International Federation of Gynecology and Obstetrics (FIGO) stage III epithelial ovarian can...

Journal: :Journal of Robotics, Networking and Artificial Life 2020

2017
Roger S. Holmes

IDS is responsible for the lysosomal degradation of heparan sulfate and dermatan sulfate and linked to an X-linked lysosomal storage disease, mucopolysaccharidosis 2 (MPS2), resulting in neurological damage and early death. Comparative IDS amino acid sequences and structures and IDS gene locations were examined using data from several vertebrate genome projects. Vertebrate IDS sequences shared ...

2012
Jatinder Singh Rupinder Singh

Wireless IDS architectural metrics are used to compare the intended scope, architecture of wireless IDS, and how they match the deployment architecture. These metrics can be used to evaluate the architectural efficiency of a wireless IDS and can help in designing efficient wireless IDS. Wireless IDS analyze wireless specific traffic including scanning for external users trying to connect to the...

2012
Björn-C. Bösch

Coverage of services and configuration influence the efficiency of Intrusion Detection Systems (IDS). Today, IDS have vendor-specific configurations and this limits a wide coverage of services by IDS. Operations might become complex, in case of usage of multiple systems. Efforts and frame conditions for a multi-vendor IDS implementation under one central administration and notification entity w...

Journal: :Diabetes technology & therapeutics 2009
Risa P Hayes James T Fitzgerald

BACKGROUND This study identifies factors that influence satisfaction with an insulin delivery system (IDS). Knowledge of such factors could help identify individuals who would benefit from innovative IDS. METHODS Individuals with type 2 diabetes who use insulin, recruited from a general and chronic illness panel, participated in a web-based survey that included questions about demographics, s...

Journal: :IJCNIS 2017
Azuan Ahmad Norbik Bashah Idris Mohd Nazri Kama

Cloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requireme...

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید