Results 41 to 50 of about 53,015 (296)

Benchmark Tests for the Model-Checking-Based IDS Algorithms

open access: yesIEEE Access, 2019
A fundamental concern for the security community is to identify the comprehensive comparable performance of various intrusion detection algorithms which are based on the Model Checking (MC) techniques. To address this open issue, we conduct the benchmark
Miaolei Deng   +4 more
doaj   +1 more source

From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach [PDF]

open access: yes, 2009
Currently available products only provide some support in terms of Intrusion Prevention and Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the limitations of current Intrusion Detection System (IDS) technology, and propose a novel approach - which we call Intrusion Detection & Diagnosis System (ID2S) technology ...
COPPOLINO, Luigi   +3 more
openaire   +4 more sources

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning

open access: yesMathematics
In order to cope with ever-evolving and increasing cyber threats, intrusion detection systems have become a crucial component of cyber security. Compared with signature-based intrusion detection methods, anomaly-based methods typically employ machine ...
Haonan Tan   +3 more
doaj   +1 more source

Circulating histones as clinical biomarkers in critically ill conditions

open access: yesFEBS Letters, EarlyView.
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez   +17 more
wiley   +1 more source

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling

open access: yesFEBS Letters, EarlyView.
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li   +3 more
wiley   +1 more source

Application of data mining technology in detecting network intrusion and security maintenance

open access: yesJournal of Intelligent Systems, 2021
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect.
Zhu Yongkuan   +4 more
doaj   +1 more source

Intrusion detection systems

open access: yes, 2010
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to ...
Bazara I. A. Barry, H. Anthony Chan
openaire   +4 more sources

Home - About - Disclaimer - Privacy