Results 61 to 70 of about 177,571 (274)

Dynamic Defense Strategy for Platform Based on Event-driven and Timing Migration [PDF]

open access: yesJisuanji gongcheng, 2019
In order to solve the network security defense problem after the intrusion detection system misses detection,using the Moving Target Defense(MTD) technology of the platform layer,this paper designs a new dynamic defense strategy for platforms.Combined ...
CHEN Tongrui, MA Runnian, WANG Gang, WU Weijia
doaj   +1 more source

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Network intrusion detection system using supervised learning paradigm

open access: yesScientific African, 2020
Internet has positively changed social, political and economic structures and in many ways obviating geographical boundaries. The enormous contributions of Internet to business transactions coupled with its ease of use has resulted in increased number of
J. Olamantanmi Mebawondu   +3 more
doaj   +1 more source

The neural crest‐associated gene ERRFI1 is involved in melanoma progression and resistance toward targeted therapy

open access: yesMolecular Oncology, EarlyView.
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang   +8 more
wiley   +1 more source

Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

open access: yes, 2012
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S.   +2 more
core   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid. [PDF]

open access: yesPLoS ONE, 2018
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid.
Yuancheng Li, Rixuan Qiu, Sitong Jing
doaj   +1 more source

Evaluation of intrusion detection systems

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
Ulvila, Jacob W., Gaffney, John E.
openaire   +2 more sources

Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]

open access: yes, 2012
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core  

Home - About - Disclaimer - Privacy