Results 51 to 60 of about 716,322 (331)
Innovative Machine Learning Algorithms for Classification and Intrusion Detectionv By IJISRT
With the escalating sophistication of cyber threats, the need for robust intrusion detection systems has become paramount in safeguarding information systems.
P. Malik +4 more
semanticscholar +1 more source
CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a variety of fields including industry, national defense, and healthcare.
Jiyeon Kim +4 more
semanticscholar +1 more source
Background: Pre-and post-traumatic hypothalamic–pituitary–adrenal (HPA) axis markers have been studied to predict posttraumatic stress disorder (PTSD) risk, but its acute reactivity cannot be measured in real-life settings.
Sinha Engel +5 more
doaj +1 more source
In the present paper we aimed to show that competition for resources between post-emotional processes and the execution of a cognitive task will result in two possible effects: (1) an impairment of the cognitive task in the short run and (2) an ...
Antonietta eCurci +4 more
doaj +1 more source
This edited work contains the most recent advances related to the study of layered intrusions and cumulate rocks formation. The first part of this book presents reviews and new views of processes producing the textural, mineralogical and geochemical characteristics of layered igneous rocks.
Charlier, Bernard +3 more
openaire +3 more sources
Building an efficient intrusion detection system based on feature selection and ensemble classifier [PDF]
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems.
Yuyang Zhou +3 more
semanticscholar +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
How to overcome «the surgical treatment» and not to cut
The questions of industrial property commercialization in the sphere of medicine are discussed. The reasons according to which the patenting of inventions in the sphere of medicine occurs with legal and financial difficulties are pointed out.
G. D. Tsesarskaya
doaj +1 more source
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Detection of Hacker Intention Using Deep Packet Inspection
Ideally, in a real cyberattack, the early detection of probable hacker intent can lead to improved mitigation or prevention of exploitation. With the knowledge of basic principles of communication protocols, the reconnaissance/scanning phase intentions ...
Justin Foreman +5 more
doaj +1 more source

