Results 91 to 100 of about 156,609 (316)
Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks
With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network.
Chia-Fen Hsieh+2 more
doaj +1 more source
A Study on Data Mining Based Intrusion Detection System [PDF]
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting system used to safeguard the data confidentiality, integrity and system availability from various types of attacks.
Anthony Raj, A.
core
Bayesian Based Intrusion Detection System
AbstractIn this paper an intrusion detection system is developed using Bayesian probability. The system developed is a naive Bayesian classifier that is used to identify possible intrusions. The system is trained a priori using a subset of the KDD dataset. The trained classifier is then tested using a larger subset of KDD dataset.
Hesham Altwaijry, Saeed Algarny
openaire +3 more sources
Landscape of BRAF transcript variants in human cancer
We investigate the annotation of BRAF variants, focusing on protein‐coding BRAF‐220 (formerly BRAF‐reference) and BRAF‐204 (BRAF‐X1). The IsoWorm pipeline allows us to quantify these variants in human cancer, starting from RNA‐sequencing data. BRAF‐204 is more abundant than BRAF‐220 and impacts patient survival.
Maurizio S. Podda+5 more
wiley +1 more source
Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana+2 more
core
Intrusion Detection System: Overview
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM.
Alanazi, H.+3 more
openaire +2 more sources
Architecture support for intrusion detection systems
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content.
openaire +4 more sources
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh+8 more
wiley +1 more source
Intrusion Detection By Data Mining Algorithms: A Review
– With the increasing use of network-based services and sensitive information on networks, maintaining information security is essential. Intrusion Detection System is a security tool used to detect unauthorized activities of a computer system or network.
Marjan Kuchaki Rafsanjani+1 more
doaj
Intrusion detection techniques of variable-frequency vector control system
As induction motors are the control core in variable-frequency speed-regulating systems, their efficient operation in industrial production processes needs to be ensured.
CAO Ce+3 more
doaj +1 more source