Results 331 to 340 of about 700,206 (362)
Some of the next articles are maybe not open access.

Alpha Intrusion in Fibromyalgia

Journal of Musculoskeletal Pain, 1993
Objectives: It has been proposed that the alpha sleep anomaly plays a pathogenic role in fibromyalgia [F]. We have reexamined this question using digitized sleep recording to quantify the alpha EEG-band in the various stages of sleep. Methods: Sleep recordings from 20 women with F and 10 age matched normals [N] were used.
Drewes, Asbjørn Mohr   +3 more
openaire   +3 more sources

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems

2008 Third International Conference on Availability, Reliability and Security, 2008
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Mohammad Zulkernine, Liwei Kuang
openaire   +2 more sources

An intrusive chaperone

Nature, 2005
Stargazin is best known for helping to ferry receptor proteins to the surface of neurons. The discovery that it has an unexpected additional role has widespread implications for the way that neurons talk to each other. Most excitatory synapses in the brain use AMPA receptors, ion channels gated by the neurotransmitter glutamate.
Kristensen, Anders S   +1 more
openaire   +3 more sources

A survey of VoIP intrusions and intrusion detection systems

The 6th International Conference on Advanced Communication Technology, 2004., 2004
This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire   +2 more sources

A Survey of Intrusion Detection for In-Vehicle Networks

IEEE transactions on intelligent transportation systems (Print), 2020
The development of the complexity and connectivity of modern automobiles has caused a massive rise in the security risks of in-vehicle networks (IVNs).
Wufei Wu   +6 more
semanticscholar   +1 more source

Organizational Change in Intrusive and Non-intrusive Environments

Journal of Organisational Transformation & Social Change, 2016
This article discusses the importance of environments for managers’ successful introduction of a new management technique. Two empirical examples illustrate the interrelatedness of external and internal environments and its consequences for the propensity of organizations to accept and implement managerial propositions.
openaire   +2 more sources

Nystagmus and saccadic intrusions

2011
We review current concepts of nystagmus and saccadic oscillations, applying a pathophysiological approach. We begin by discussing how nystagmus may arise when the mechanisms that normally hold gaze steady are impaired. We then describe the clinical and laboratory evaluation of patients with ocular oscillations.
R. John Leigh, Matthew J. Thurtell
openaire   +3 more sources

Intrusion and Hacking

Journal of Information Privacy and Security, 2007
(2007). Intrusion and Hacking. Journal of Information Privacy and Security: Vol. 3, No. 4, pp. 1-2.
openaire   +2 more sources

The Politics of Intrusion

CR: The New Centennial Review, 2002
the foreigner foreign is her foreign-ness; what makes the newborn new and promising is her newness. Once the stranger becomes familiar, once the foreigner is naturalized, once the newborn is socialized or educated into the ways of the world, the threat posed by strangeness/foreignness/newness is dissipated, and with that comes a loss. Without strangers
openaire   +2 more sources

A bidirectional LSTM deep learning approach for intrusion detection

Expert systems with applications, 2021
Yakubu Imrana   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy