Results 51 to 60 of about 716,322 (331)

Innovative Machine Learning Algorithms for Classification and Intrusion Detectionv By IJISRT

open access: yesInternational Journal of Innovative Science and Research Technology
With the escalating sophistication of cyber threats, the need for robust intrusion detection systems has become paramount in safeguarding information systems.
P. Malik   +4 more
semanticscholar   +1 more source

CNN-Based Network Intrusion Detection against Denial-of-Service Attacks

open access: yesElectronics, 2020
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a variety of fields including industry, national defense, and healthcare.
Jiyeon Kim   +4 more
semanticscholar   +1 more source

Cortisol response to traumatic stress to predict PTSD symptom development – a systematic review and meta-analysis of experimental studies

open access: yesEuropean Journal of Psychotraumatology, 2023
Background: Pre-and post-traumatic hypothalamic–pituitary–adrenal (HPA) axis markers have been studied to predict posttraumatic stress disorder (PTSD) risk, but its acute reactivity cannot be measured in real-life settings.
Sinha Engel   +5 more
doaj   +1 more source

Balancing emotional processing with ongoing cognitive activity: The effects of task modality on intrusions and rumination

open access: yesFrontiers in Psychology, 2015
In the present paper we aimed to show that competition for resources between post-emotional processes and the execution of a cognitive task will result in two possible effects: (1) an impairment of the cognitive task in the short run and (2) an ...
Antonietta eCurci   +4 more
doaj   +1 more source

Layered Intrusions

open access: yes, 2015
This edited work contains the most recent advances related to the study of layered intrusions and cumulate rocks formation. The first part of this book presents reviews and new views of processes producing the textural, mineralogical and geochemical characteristics of layered igneous rocks.
Charlier, Bernard   +3 more
openaire   +3 more sources

Building an efficient intrusion detection system based on feature selection and ensemble classifier [PDF]

open access: yesComput. Networks, 2019
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems.
Yuyang Zhou   +3 more
semanticscholar   +1 more source

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

How to overcome «the surgical treatment» and not to cut

open access: yesБюллетень сибирской медицины, 2002
The questions of industrial property commercialization in the sphere of medicine are discussed. The reasons according to which the patenting of inventions in the sphere of medicine occurs with legal and financial difficulties are pointed out.
G. D. Tsesarskaya
doaj   +1 more source

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Detection of Hacker Intention Using Deep Packet Inspection

open access: yesJournal of Cybersecurity and Privacy
Ideally, in a real cyberattack, the early detection of probable hacker intent can lead to improved mitigation or prevention of exploitation. With the knowledge of basic principles of communication protocols, the reconnaissance/scanning phase intentions ...
Justin Foreman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy