Results 61 to 70 of about 404,854 (339)

Application of data mining technology in detecting network intrusion and security maintenance

open access: yesJournal of Intelligent Systems, 2021
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect.
Zhu Yongkuan   +4 more
doaj   +1 more source

Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]

open access: yes, 2010
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.   +2 more
core  

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

Intrusion detection mechanism and experimental study based on WiFi signal

open access: yesDianzi Jishu Yingyong, 2019
Indoor safety concerns the safety of people′s life and property. Through indoor intrusion detection, it is possible to achieve early warning and avoid loss. Different from the common intrusion detection methods, the CSI(Channel status information) of the
Zeng Zheng   +4 more
doaj   +1 more source

Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware [PDF]

open access: yes, 2020
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection.
Barker, Charity
core   +1 more source

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems -- A Brief Survey of Concepts and Approaches [PDF]

open access: yesarXiv, 2020
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information.
arxiv  

Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]

open access: yes, 2012
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core  

Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors

open access: yesMolecular Oncology, EarlyView.
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi   +6 more
wiley   +1 more source

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid. [PDF]

open access: yesPLoS ONE, 2018
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid.
Yuancheng Li, Rixuan Qiu, Sitong Jing
doaj   +1 more source

Home - About - Disclaimer - Privacy