Results 61 to 70 of about 988,120 (358)

KRAS and GNAS mutations in cell‐free DNA and in circulating epithelial cells in patients with intraductal papillary mucinous neoplasms—an observational pilot study

open access: yesMolecular Oncology, EarlyView.
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke   +12 more
wiley   +1 more source

Anomaly-based Intrusion Detection in Computer Networks using Wavelets

open access: yesRevista Brasileira de Computação Aplicada, 2011
Attacks on computer networks compromise the security of the system and degrade the performance of the network causing problems to users and organizations.
Tiago Perlin   +2 more
doaj   +1 more source

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems [PDF]

open access: yesarXiv, 2012
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years.
arxiv  

Novel hybrid intrusion detection system for clustered wireless sensor network [PDF]

open access: yes, 2011
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect ...
arxiv   +1 more source

Evolving Intrusion Detection Systems [PDF]

open access: yes, 2006
This chapter illustrated the importance of GP techniques for evolving intrusion detection systems. MEP outperforms LGP for three of the considered classes and LGP outperform MEP for two of the classes. MEP classification accuracy is grater than 95% for all considered classes and for three of them is greater than 99.75%.
Ajith Abraham, Crina Grosan
openaire   +2 more sources

On‐treatment dynamics of circulating extracellular vesicles in the first‐line setting of patients with advanced non‐small cell lung cancer: the LEXOVE prospective study

open access: yesMolecular Oncology, EarlyView.
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina   +17 more
wiley   +1 more source

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically.
Parminder Singh   +4 more
doaj   +1 more source

Cluster Based Cost Efficient Intrusion Detection System For Manet [PDF]

open access: yesarXiv, 2013
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process.
arxiv  

SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks [PDF]

open access: yesarXiv, 2021
Intrusion Detection Systems are widely used to detect cyberattacks, especially on protocols vulnerable to hacking attacks such as SOME/IP. In this paper, we present a deep learning-based sequential model for offline intrusion detection on SOME/IP application layer protocol.
arxiv  

Home - About - Disclaimer - Privacy