Results 101 to 110 of about 988,120 (358)

Intrusion Detection By Data Mining Algorithms: A Review

open access: yesJournal of New Results in Science, 2013
– With the increasing use of network-based services and sensitive information on networks, maintaining information security is essential. Intrusion Detection System is a security tool used to detect unauthorized activities of a computer system or network.
Marjan Kuchaki Rafsanjani   +1 more
doaj  

Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic [PDF]

open access: yesInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2, March 2013, 2013
Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system security is used to identify the malicious activities in a computer system or network. There are different approaches being employed in intrusion detection systems, but unluckily each of the technique so far is not entirely ideal.
arxiv  

Bayesian Based Intrusion Detection System

open access: yesJournal of King Saud University - Computer and Information Sciences, 2012
AbstractIn this paper an intrusion detection system is developed using Bayesian probability. The system developed is a naive Bayesian classifier that is used to identify possible intrusions. The system is trained a priori using a subset of the KDD dataset. The trained classifier is then tested using a larger subset of KDD dataset.
Hesham Altwaijry, Saeed Algarny
openaire   +3 more sources

Detection rate for ESR1 mutations is higher in circulating‐tumor‐cell‐derived genomic DNA than in paired plasma cell‐free DNA samples as revealed by ddPCR

open access: yesMolecular Oncology, EarlyView.
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou   +11 more
wiley   +1 more source

Intrusion detection system and technology of layered wireless sensor network based on Agent [PDF]

open access: yes, 2013
The intrusion detection system and technology of classified layered-wireless sensor network was able to meet the high safety requirements of wireless sensor network, it is urgent for us to improve the identification and generalization of detection system
Weng, Kunpeng, Yu, Genjian
core   +1 more source

Intrusion Detection System: Overview

open access: yes, 2010
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM.
Alanazi, H.   +3 more
openaire   +2 more sources

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

Intrusion detection techniques of variable-frequency vector control system

open access: yes工程科学学报, 2019
As induction motors are the control core in variable-frequency speed-regulating systems, their efficient operation in industrial production processes needs to be ensured.
CAO Ce   +3 more
doaj   +1 more source

A Distributed Intrusion Detection System Using Cooperating Agents [PDF]

open access: yesarXiv, 2011
The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection.
arxiv  

Architecture support for intrusion detection systems

open access: yes, 2023
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content.
openaire   +4 more sources

Home - About - Disclaimer - Privacy