Results 281 to 290 of about 555,600 (315)
Some of the next articles are maybe not open access.
Overview of intrusion detection and intrusion prevention
Proceedings of the 5th annual conference on Information security curriculum development, 2008This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire +2 more sources
Intrusion-Tolerant Intrusion Detection System [PDF]
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire +1 more source
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
Intrusions and perseverations*1
Brain and Language, 1984Twenty-two subjects with presumed senile dementia of the Alzheimer's type (SDAT), twenty-two with dementia other than SDAT, twenty with aphasia, and seventeen healthy controls over 50 years of age were examined for intrusions and perseverations. Perseverations were defined as the immediate inappropriate repetition of a prior response whereas intrusions
Daniel B. Hier +2 more
openaire +3 more sources
Intrusive prospective imagery, posttraumatic intrusions and anxiety in schizophrenia
Psychiatry Research, 2015Trauma exposure and intrusive thoughts are commonly reported in both schizophrenia and posttraumatic stress disorder (PTSD). Information processing accounts suggest that intrusions occur in the two conditions as a result of insufficient state and/or trait contextual processing in long-term memory.
Marco Picchioni +3 more
openaire +4 more sources
Network intrusion model for analyzing intrusion patterns
The 6th International Conference on Advanced Communication Technology, 2004., 2004As the development of internet, the risk of exposing to malicious intrusion via network grows higher and higher. To make it possible defense such a malicious intrusion, it is indispensable to simulate and analyze vulnerabilities of network. In this paper, we propose network intrusion model and intrusion scenario tree lor detecting and analyzing ...
Joo Beom Yoon +3 more
openaire +2 more sources
Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '03, 2003
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging.
Vinod Yegneswaran +2 more
openaire +2 more sources
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging.
Vinod Yegneswaran +2 more
openaire +2 more sources
Alpha Intrusion in Fibromyalgia
Journal of Musculoskeletal Pain, 1993Objectives: It has been proposed that the alpha sleep anomaly plays a pathogenic role in fibromyalgia [F]. We have reexamined this question using digitized sleep recording to quantify the alpha EEG-band in the various stages of sleep. Methods: Sleep recordings from 20 women with F and 10 age matched normals [N] were used.
Drewes, Asbjørn Mohr +3 more
openaire +3 more sources
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
2008 Third International Conference on Availability, Reliability and Security, 2008In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Mohammad Zulkernine, Liwei Kuang
openaire +2 more sources
Nature, 2005
Stargazin is best known for helping to ferry receptor proteins to the surface of neurons. The discovery that it has an unexpected additional role has widespread implications for the way that neurons talk to each other. Most excitatory synapses in the brain use AMPA receptors, ion channels gated by the neurotransmitter glutamate.
Kristensen, Anders S +1 more
openaire +3 more sources
Stargazin is best known for helping to ferry receptor proteins to the surface of neurons. The discovery that it has an unexpected additional role has widespread implications for the way that neurons talk to each other. Most excitatory synapses in the brain use AMPA receptors, ion channels gated by the neurotransmitter glutamate.
Kristensen, Anders S +1 more
openaire +3 more sources

