Results 91 to 100 of about 988,120 (358)
Deteksi Misuse pada Intrusion Detection System dengan metode Support Vector Machines [PDF]
Intrusion Detection System digunakan untuk melindungi sistem, menganalisa serta memprediksi kebiasaan aktivitas komputer . Aktivitas tersebut terbagi menjadi normal dan ancaman.
Faris Alfa Mauludy
core
An Implementation of Intrusion Detection System Using Genetic Algorithm
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser+2 more
core +2 more sources
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park+6 more
wiley +1 more source
Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks
With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network.
Chia-Fen Hsieh+2 more
doaj +1 more source
Introduction on intrusion detection systems : focus on hierarchical analysis [PDF]
In today\u27s fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse.
Bajaj, Ratna
core +1 more source
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT [PDF]
Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance ...
arxiv
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang+10 more
wiley +1 more source
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core
Intelligent zero-day intrusion detection framework for internet of things [PDF]
Zero-day intrusion detection system faces serious challenges as hundreds of thousands of new instances of malware are being created every day to cause harm or damage to the computer system.
Khraisat, Ansam
core +1 more source
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad+13 more
wiley +1 more source