نتایج جستجو برای: alert
تعداد نتایج: 13084 فیلتر نتایج به سال:
To my dear family: Thank you for all of your love, support and encouragements. iii ACKNOWLEDGEMENTS I would like to express my sincere and deep gratitude to my advisor, Dr. Wenke Lee, for his great support, guidance, patience and encouragement during the past several years. Wenke has not only guided and helped me on my research work, but also taught me important values of life. He can always di...
Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process t...
Most of the existing intrusion detection systems (IDS) often generate large numbers of alerts which contain numerous false positives and non relevant positives. Alert correlation techniques aim to aggregate and combine the outputs of single/multiple IDS to provide a concise and broad view of the security state of network. Capability based alert correlator uses notion of capability to correlate ...
Attention capacities underlie everyday functioning from an early age onwards. Little is known about attentional processes at toddler age. A feasible assessment of attention capacities at toddler age is needed to allow further study of attention development. In this study, a test battery is piloted that consists of four tasks which intend to measure the attention systems orienting, alerting, and...
We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the premise that intrusion detection may be viewed as an inference problem – in other words, we seek to show that system misusers are carrying out a sequence of steps to violate system security policies in some way, with earlier st...
Intrusion detection systems (IDS) suffer from a lack of scalability. Alert correlation has been introduced to address this challenge and is generally considered to be the major part of the solution. One of the steps in the correlation process is the verification of alerts. We have identified the relationships and interactions between correlation and verification. An overview of verification tes...
abstract background: a major problem of the first moments of childbirth, especially in “prolonged labor,” is perinatal asphyxia which necessitates neonatal resuscitation. this study aimed at evaluating the alert line of the partogram in recognizing the need for neonatal resuscitation 20–30 s after delivery. materials and methods: 140 full‑term pregnant women were kept under surveillance through...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید