نتایج جستجو برای: ids assessment
تعداد نتایج: 566100 فیلتر نتایج به سال:
An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions, in combination with firewalls and anti-virus systems. An IDS is therefore a crucial element of a network security posture. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behavior as specified in attack descriptions (referred t...
Normal traffic can provide worms with a very good source of information to camouflage themselves. In this paper, we explore the concept of polymorphic worms that mutate based on normal traffic. We assume that a worm has already penetrated a system and is trying to hide its presence and propagation attempts from an IDS. We focus on stealthy worms that cannot be reliably detected by increases in ...
BACKGROUND Radioactive reagents are used in most assays for measurement of 1,25-dihydroxyvitamin D [1,25(OH)(2)D]. We evaluated a 1,25(OH)(2)D enzyme immunoassay (EIA) from IDS Ltd. that uses solid-phase immunoextraction and colorimetric detection and compared results to those of the thymus radioreceptor assay (RRA) for 1,25(OH)(2)D. METHODS We collected serum samples (n = 145) representing a...
Driving simulation is the best way to safely and reliably assess the impact of medical parameters on driving in a controlled, replicable environment, Driving performance should be evaluated using a composite driving score, since the pathway to impaired driving is highly idiosyncratic and could involve any number of individual driving parameters. Although simulators still do not have accepted st...
2 Summary The U.S. legal system increasingly accepts the idea that the confidence expressed by an eyewitness who identified a suspect from a lineup provides little information as to the accuracy of that identification. There was a time when this pessimistic assessment was entirely reasonable because of the questionable eyewitness identification procedures that police commonly employed. However,...
high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...
The aim of this project is to compare (i) the acoustic vs. visual characteristics of infant-directed speech (IDS), (ii) IDS vs adult-directed speech (ADS), and (iii) the acoustic/visual characteristics of IDS and ADS cross-linguistically, in Australian English (AusE) vs Japanese. Acoustic data are presented along with preliminary visual data. Native AusE and Japanese speaking mothers spoke to t...
Various aspects of motherese also known as infant-directed speech (IDS) have been studied for many years. As it is a widespread phenomenon, it is suspected to play some important roles in infant development. Therefore, our purpose was to provide an update of the evidence accumulated by reviewing all of the empirical or experimental studies that have been published since 1966 on IDS driving fact...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید