نتایج جستجو برای: ids assessment
تعداد نتایج: 566100 فیلتر نتایج به سال:
One of the key challenges that researchers should face when proposing a new intrusion detection approach (IDS) is that of demonstrating its general validity. This fact goes necessarily through the disposal of a real set of intrusion (as well as non-intrusion) related events, from which to compare and thus validate the performance of the novel proposed techniques. However, this a priori simple i...
In this paper, using the neural space mapping (NSM) concept, we present a SPICE-compatible modeling technique to modify the conventional MOSFET equations, to be suitable for ballistic carbon nanotube transistors (CNTTs). We used the NSM concept in order to correct conventional MOSFET equations so that they could be used for carbon nanotube transistors. To demonstrate the accuracy of our mod...
Efficient Intrusion Detection System (IDS) management is a prominent capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in a loosely coupled environment. Extensibility is the main requirement for most of IDS management systems. The concept of virtualization ha...
Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on the performance and reliability of the IDS. Apart from the initial cost of procuring the ...
This study sought to explore challenges in the current practices of including children with intellectual disabilities (IDs) early childhood development (ECD) a view using findings improve their access learning programmes. The employed semi-structured interviews, focus group nonparticipant observation and document reviews. Individual interviews were gather data from eleven ECD teachers five scho...
Any organisation connected to the Internet that is serious about security cannot be without an intrusion detection system (IDS) these days. Is one IDS sufficient to cover all possible vulnerabilities in a network? In a sea of security products available today, which IDS tool(s) will be sufficient for your organisation’s needs? The only way to find out is to compare various IDS tools with each o...
Infant directed speech (IDS), the speech register adults use when talking to infants, has been shown to have positive effects on attracting infants' attention, language learning, and emotional communication. Here event related potentials (ERPs) are used to investigate the neural coding of IDS and ADS (adult directed speech) as well as their discrimination by both infants and adults. Two instanc...
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion or denial of service attacks. These intrusions may bring all kinds of misuses. Intrusion Detection Systems (IDS) play a very important role in the security of today's networks by detecting when an attack is happening. IDS have evolved into an integral part of network security which monitors the netwo...
In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster h...
This paper discusses solutions to protect the privacy of users during the application of intrusion detection systems (IDS) and introduces the notion of multilateral secure IDS. The surveillance of users by an IDS threatens their privacy. However, an IDS depends on data gathered by monitoring and must be able to unambiguously identify an intruder in case of an emergency. To mediate between the c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید