Results 271 to 280 of about 571,931 (308)

Understanding the Adversary: A Survey of Adversarial Machine Learning in Network Intrusion Detection

open access: gold
Allan da S. Espindola   +4 more
openalex   +1 more source

Intrusion-Tolerant Intrusion Detection System

2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire   +1 more source

Intrusive advising and intrusive advice

Disability Compliance for Higher Education
You may have heard the term intrusive advising — sometimes referred to as proactive or engaged advising. This approach emphasizes that advisors should take the initiative to reach out to students, rather than waiting for students to seek support on their own.
openaire   +1 more source

Intrusive Gravity Currents

Studies in Applied Mathematics, 1997
Intrusive gravity currents arise when a fluid of intermediate density intrudes into an ambient fluid. These intrusions may occur in both natural and human‐made settings and may be the result of a sudden release of a fixed volume of fluid or the steady or time‐dependent injection of such a fluid.
D'Alessio, S. J. D.   +3 more
openaire   +2 more sources

Therapeutic Intrusion

Nursing Management (Springhouse), 1991
R, Davidhizar, M, Bowen
openaire   +2 more sources

Intrusive Thoughts, Intrusiveness

2020
Bart Verkuil, J. F. Brosschot
openaire   +1 more source

Intrusive Thoughts, Intrusiveness

2013
Marie Boltz   +67 more
openaire   +1 more source

Home - About - Disclaimer - Privacy