Results 41 to 50 of about 166,319 (306)

INTRUSION DETECTION SYSTEMS IN A HETEROGENOUS NETWORK ENVIRONMENT [PDF]

open access: yesActa Electrotechnica et Informatica, 2020
This paper deals with a design and implementation of an intrusion detection system in heterogeneous network environment. The work includes work out characteristics of Intrusion detection systems, it`s base classification, development of problematic ...
Martin ŠTANCEL   +2 more
doaj   +1 more source

Prognostic Impact of Treatment Modalities, Including Targeted Compartmental Radio‐Immunotherapy, in a Cohort of Neuroblastoma Patients With CNS Metastases at Relapse

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez   +13 more
wiley   +1 more source

Clinical Characteristics and Prognostic Risk Factors for Pediatric B‐Cell Lymphoblastic Lymphoma: A Multicenter Retrospective Cohort Study for China Net Childhood Lymphoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu   +20 more
wiley   +1 more source

Intrusion Detection Systems

open access: yes, 2010
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to ...
Bazara I. A. Barry, H. Anthony Chan
openaire   +3 more sources

An overview of recent advances in intrusion detection [PDF]

open access: yes, 2008
The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus.
Cornforth, David   +2 more
core   +1 more source

A Comparative Study of Cerebral Oxygenation During Exercise in Hemodialysis and Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou   +10 more
wiley   +1 more source

Manhole intrusion detection system with notification stages

open access: yesScientific African, 2021
Appropriate design of intrusion detection systems is extremely important to safeguard critical and valuable infrastructure. Telecommunications companies (TELCOs) and electric power utilities are experiencing an increased rate of rampant underground ...
Felix Mazunga   +2 more
doaj   +1 more source

Passive intrusion detection system [PDF]

open access: yes, 1980
An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume.
Laue, E. G.
core   +1 more source

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy