Results 61 to 70 of about 177,571 (274)
Dynamic Defense Strategy for Platform Based on Event-driven and Timing Migration [PDF]
In order to solve the network security defense problem after the intrusion detection system misses detection,using the Moving Target Defense(MTD) technology of the platform layer,this paper designs a new dynamic defense strategy for platforms.Combined ...
CHEN Tongrui, MA Runnian, WANG Gang, WU Weijia
doaj +1 more source
A consensus based network intrusion detection system
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip +2 more
core +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
Network intrusion detection system using supervised learning paradigm
Internet has positively changed social, political and economic structures and in many ways obviating geographical boundaries. The enormous contributions of Internet to business transactions coupled with its ease of use has resulted in increased number of
J. Olamantanmi Mebawondu +3 more
doaj +1 more source
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang +8 more
wiley +1 more source
Efficient Computer Network Anomaly Detection by Changepoint Detection Methods
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S. +2 more
core +1 more source
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid. [PDF]
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid.
Yuancheng Li, Rixuan Qiu, Sitong Jing
doaj +1 more source
Evaluation of intrusion detection systems
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
Ulvila, Jacob W., Gaffney, John E.
openaire +2 more sources
Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core

