نتایج جستجو برای: alert

تعداد نتایج: 13084  

2005
Xinzhou Qin

To my dear family: Thank you for all of your love, support and encouragements. iii ACKNOWLEDGEMENTS I would like to express my sincere and deep gratitude to my advisor, Dr. Wenke Lee, for his great support, guidance, patience and encouragement during the past several years. Wenke has not only guided and helped me on my research work, but also taught me important values of life. He can always di...

2010
Fatiha Benali Nadia Bennani Gabriele Gianini Stelvio Cimato

Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process t...

2008
Navneet Kumar Pandey S. K. Gupta Shaveta Leekha

Most of the existing intrusion detection systems (IDS) often generate large numbers of alerts which contain numerous false positives and non relevant positives. Alert correlation techniques aim to aggregate and combine the outputs of single/multiple IDS to provide a concise and broad view of the security state of network. Capability based alert correlator uses notion of capability to correlate ...

2016
Marjanneke de Jong Marjolein Verhoeven Ignace T. C. Hooge Anneloes L. van Baar

Attention capacities underlie everyday functioning from an early age onwards. Little is known about attentional processes at toddler age. A feasible assessment of attention capacities at toddler age is needed to allow further study of attention development. In this study, a test battery is piloted that consists of four tasks which intend to measure the attention systems orienting, alerting, and...

2004
Dong Yu Deborah A. Frincke

We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the premise that intrusion detection may be viewed as an inference problem – in other words, we seek to show that system misusers are carrying out a sequence of steps to violate system security policies in some way, with earlier st...

2006
Thomas Heyman Bart De Win Christophe Huygens Wouter Joosen

Intrusion detection systems (IDS) suffer from a lack of scalability. Alert correlation has been introduced to address this challenge and is generally considered to be the major part of the solution. One of the steps in the correlation process is the verification of alerts. We have identified the relationships and interactions between correlation and verification. An overview of verification tes...

Journal: :Nature Reviews Drug Discovery 2003

Journal: :Current Hypertension Reports 2010

Journal: :Du Bois Review: Social Science Research on Race 2008

Journal: :iranian journal of nursing and midwifery research 0
nahid bolbol-haghighi maryam keshavarz mehri delvarianzadeh sahar molzami

abstract background: a major problem of the first moments of childbirth, especially in “prolonged labor,” is perinatal asphyxia which necessitates neonatal resuscitation. this study aimed at evaluating the alert line of the partogram in recognizing the need for neonatal resuscitation 20–30 s after delivery. materials and methods: 140 full‑term pregnant women were kept under surveillance through...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید