Results 41 to 50 of about 878,319 (274)

FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems [PDF]

open access: yesarXiv, 2012
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years.
arxiv  

Novel hybrid intrusion detection system for clustered wireless sensor network [PDF]

open access: yes, 2011
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect ...
arxiv   +1 more source

KRAS and GNAS mutations in cell‐free DNA and in circulating epithelial cells in patients with intraductal papillary mucinous neoplasms—an observational pilot study

open access: yesMolecular Oncology, EarlyView.
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke   +12 more
wiley   +1 more source

Cluster Based Cost Efficient Intrusion Detection System For Manet [PDF]

open access: yesarXiv, 2013
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process.
arxiv  

SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks [PDF]

open access: yesarXiv, 2021
Intrusion Detection Systems are widely used to detect cyberattacks, especially on protocols vulnerable to hacking attacks such as SOME/IP. In this paper, we present a deep learning-based sequential model for offline intrusion detection on SOME/IP application layer protocol.
arxiv  

On‐treatment dynamics of circulating extracellular vesicles in the first‐line setting of patients with advanced non‐small cell lung cancer: the LEXOVE prospective study

open access: yesMolecular Oncology, EarlyView.
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina   +17 more
wiley   +1 more source

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically.
Parminder Singh   +4 more
doaj   +1 more source

Anomaly-based Intrusion Detection in Computer Networks using Wavelets

open access: yesRevista Brasileira de Computação Aplicada, 2011
Attacks on computer networks compromise the security of the system and degrade the performance of the network causing problems to users and organizations.
Tiago Perlin   +2 more
doaj   +1 more source

On the model-checking-based IDS [PDF]

open access: yesarXiv, 2018
How to identify the comprehensive comparable performance of various Intrusion Detection (ID) algorithms which are based on the Model Checking (MC) techniques? To address this open issue, we conduct some tests for the model-checking-based intrusion detection systems (IDS) algorithms.
arxiv  

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Home - About - Disclaimer - Privacy