Results 281 to 290 of about 545,206 (314)
Some of the next articles are maybe not open access.
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire +3 more sources
Intrusions and perseverations*1
Brain and Language, 1984Twenty-two subjects with presumed senile dementia of the Alzheimer's type (SDAT), twenty-two with dementia other than SDAT, twenty with aphasia, and seventeen healthy controls over 50 years of age were examined for intrusions and perseverations. Perseverations were defined as the immediate inappropriate repetition of a prior response whereas intrusions
Daniel B. Hier+2 more
openaire +3 more sources
Intrusive prospective imagery, posttraumatic intrusions and anxiety in schizophrenia
Psychiatry Research, 2015Trauma exposure and intrusive thoughts are commonly reported in both schizophrenia and posttraumatic stress disorder (PTSD). Information processing accounts suggest that intrusions occur in the two conditions as a result of insufficient state and/or trait contextual processing in long-term memory.
Marco Picchioni+3 more
openaire +4 more sources
Network intrusion model for analyzing intrusion patterns
The 6th International Conference on Advanced Communication Technology, 2004., 2004As the development of internet, the risk of exposing to malicious intrusion via network grows higher and higher. To make it possible defense such a malicious intrusion, it is indispensable to simulate and analyze vulnerabilities of network. In this paper, we propose network intrusion model and intrusion scenario tree lor detecting and analyzing ...
Joo Beom Yoon+3 more
openaire +2 more sources
Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '03, 2003
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging.
Vinod Yegneswaran+2 more
openaire +2 more sources
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging.
Vinod Yegneswaran+2 more
openaire +2 more sources
Alpha Intrusion in Fibromyalgia
Journal of Musculoskeletal Pain, 1993Objectives: It has been proposed that the alpha sleep anomaly plays a pathogenic role in fibromyalgia [F]. We have reexamined this question using digitized sleep recording to quantify the alpha EEG-band in the various stages of sleep. Methods: Sleep recordings from 20 women with F and 10 age matched normals [N] were used.
Drewes, Asbjørn Mohr+3 more
openaire +3 more sources
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
2008 Third International Conference on Availability, Reliability and Security, 2008In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Mohammad Zulkernine, Liwei Kuang
openaire +2 more sources
Nature, 2005
Stargazin is best known for helping to ferry receptor proteins to the surface of neurons. The discovery that it has an unexpected additional role has widespread implications for the way that neurons talk to each other. Most excitatory synapses in the brain use AMPA receptors, ion channels gated by the neurotransmitter glutamate.
Kristensen, Anders S+1 more
openaire +3 more sources
Stargazin is best known for helping to ferry receptor proteins to the surface of neurons. The discovery that it has an unexpected additional role has widespread implications for the way that neurons talk to each other. Most excitatory synapses in the brain use AMPA receptors, ion channels gated by the neurotransmitter glutamate.
Kristensen, Anders S+1 more
openaire +3 more sources
A survey of VoIP intrusions and intrusion detection systems
The 6th International Conference on Advanced Communication Technology, 2004., 2004This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire +2 more sources
Organizational Change in Intrusive and Non-intrusive Environments
Journal of Organisational Transformation & Social Change, 2016This article discusses the importance of environments for managers’ successful introduction of a new management technique. Two empirical examples illustrate the interrelatedness of external and internal environments and its consequences for the propensity of organizations to accept and implement managerial propositions.
openaire +2 more sources