Results 221 to 230 of about 19,489 (256)
Some of the next articles are maybe not open access.

Intrusion detection

Computer Networks, 1999
Marc Dacier, Kathleen Jackson
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Intrusion Detection

A smart security system using IoT for real-time motion detection, live video monitoring, and instant alerts. It combines sensors, cameras, and cloud storage to ensure automated, remote, and reliable home protection with minimal human intervention.
openaire   +1 more source

Application Intrusion Detection

1999
Intrusion detection has traditionally been performed at the operating system (OS) level by comparing expected and observed system resource usage. OS intrusion detection systems (OS IDS) can only detect intruders, internal or external, who perform specific system actions in a specific sequence or those intruders whose behavior pattern statistically ...
openaire   +1 more source

Intrusion detection

Computer Fraud & Security, 2004
Herbert H Thompson   +2 more
openaire   +1 more source

Intrusion Detection

2020
Nandita Sengupta, Jaya Sil
openaire   +1 more source

Intrusion Detection

2006
Toni Farley, Jill Joseph
openaire   +1 more source

Obesity and adverse breast cancer risk and outcome: Mechanistic insights and strategies for intervention

Ca-A Cancer Journal for Clinicians, 2017
Cynthia Morata-Tarifa   +1 more
exaly  

Home - About - Disclaimer - Privacy