Results 71 to 80 of about 404,854 (339)

Cluster Based Cost Efficient Intrusion Detection System For Manet [PDF]

open access: yesarXiv, 2013
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process.
arxiv  

TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection [PDF]

open access: yesarXiv, 2023
The effectiveness of network intrusion detection systems, predominantly based on machine learning, are highly influenced by the dataset they are trained on. Ensuring an accurate reflection of the multifaceted nature of benign and malicious traffic in these datasets is essential for creating models capable of recognizing and responding to a wide array ...
arxiv  

Passive intrusion detection system [PDF]

open access: yes, 1980
An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume.
Laue, E. G.
core   +1 more source

KRAS and GNAS mutations in cell‐free DNA and in circulating epithelial cells in patients with intraductal papillary mucinous neoplasms—an observational pilot study

open access: yesMolecular Oncology, EarlyView.
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke   +12 more
wiley   +1 more source

FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems [PDF]

open access: yesarXiv, 2012
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years.
arxiv  

Intrusion Detection Using Mouse Dynamics

open access: yes, 2018
Compared to other behavioural biometrics, mouse dynamics is a less explored area. General purpose data sets containing unrestricted mouse usage data are usually not available.
Antal, Margit, Egyed-Zsigmond, Elod
core   +2 more sources

On‐treatment dynamics of circulating extracellular vesicles in the first‐line setting of patients with advanced non‐small cell lung cancer: the LEXOVE prospective study

open access: yesMolecular Oncology, EarlyView.
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina   +17 more
wiley   +1 more source

When Intrusion Detection Meets Blockchain Technology: A Review

open access: yesIEEE Access, 2018
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks.
Weizhi Meng   +4 more
doaj   +1 more source

On the model-checking-based IDS [PDF]

open access: yesarXiv, 2018
How to identify the comprehensive comparable performance of various Intrusion Detection (ID) algorithms which are based on the Model Checking (MC) techniques? To address this open issue, we conduct some tests for the model-checking-based intrusion detection systems (IDS) algorithms.
arxiv  

Intrusion Detection Systems [PDF]

open access: yes, 2014
Volume 2 Issue 9 (September ...
Eltom, A. A. (Ahmed)   +1 more
core  

Home - About - Disclaimer - Privacy