نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :T. Edutainment 2016
Andreea Molnar Patty Kostkova

In this paper we present an Interactive Digital Storytelling (IDS) formalisation that captures the IDS logic constraints. This was implemented in a game engine and an authoring tool was created to facilitate the development of IDS based games. We created several IDS based games using the proposed engine and authoring tool. They were used as case studies in this research. We also present some of...

2007
DANIEL LENZ

We first analyze the integrated density of states (IDS) of periodic Schrödinger operators on an amenable covering manifold. A criterion for the continuity of the IDS at a prescribed energy is given along with examples of operators with both continuous and discontinuous IDS’. Subsequently, alloy-type perturbations of the periodic operator are considered. The randomness may enter both via the pot...

2010
Perminder Kaur Dhavleesh Rattan Amit Kumar Bhardwaj

This paper is a survey of the work, done for making an IDS fault tolerant. IDS are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subv...

2016
Alex Risos Nicholas J. Long Arvid Hunze Gideon Gouws

Interdigitated dielectrometry sensors (IDS) are capacitive sensors investigated to precisely measure the relative permittivity ( ϵ r ) of insulating liquids. Such liquids used in the power industry exhibit a change in ϵ r as they degrade. The IDS ability to measure ϵ r in-situ can potentially reduce maintenance, increase grid stability and improve safety. Noise from external electric field sour...

2013
Nilanjana Pradhan

A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...

2003
Agustín Orfila Javier Ignacio Carbó Rubiera Arturo Ribagorda

Nowadays one of the main problems of Intrusion Detection Systems (IDS) is the high rate of false positives that they show. The number of alerts that an IDS launches are clearly higher than the number of real attacks. This paper tries to introduce a measure of the IDS prediction skill in close relationship with these false positives. So the prediction skill of an IDS is then computed according t...

Journal: : 2022

برای دستیابی به مزیت رقابتی در شرایط عدم‌­اطمینان که آن تغییر ضروری است، یکی از چالش‌های بزرگ سازمان‌ها کاهش ریسک طریق ایجاد زنجیره‌های تأمین تاب‌آور است. تاب‌آوری زنجیره ‌تأمین توانایی مقابله با اختلال اشاره دارد یک رویداد غیرقابل‌پیش‌بینی بوده و دارای منابع داخلی خارجی مختلفی ازجمله بلایای طبیعی ریسک‌های عملیاتی پژوهش حاضر شبیه‌سازی توسط نرم‌افزار ارنا زنجیره‌ سنگ ساختمانی «کارخانه سنگبری آسم...

Journal: :Computers & Security 2009
Zonghua Zhang Pin-Han Ho Liwen He

Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

Journal: :Future Generation Comp. Syst. 2013
Álvaro Herrero Martí Navarro Emilio Corchado Vicente Julián

This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control. One of its main goals is to facilitate real-time Intrusion Detection, as accurate and swift responses are crucial in this field, especially if automatic abortion mechanisms are running. The formulation of this hybrid IDS combines Artificial Neural Networks ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید