Results 61 to 70 of about 988,120 (358)
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke+12 more
wiley +1 more source
Anomaly-based Intrusion Detection in Computer Networks using Wavelets
Attacks on computer networks compromise the security of the system and degrade the performance of the network causing problems to users and organizations.
Tiago Perlin+2 more
doaj +1 more source
A consensus based network intrusion detection system
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip+2 more
core +1 more source
FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems [PDF]
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years.
arxiv
Novel hybrid intrusion detection system for clustered wireless sensor network [PDF]
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect ...
arxiv +1 more source
Evolving Intrusion Detection Systems [PDF]
This chapter illustrated the importance of GP techniques for evolving intrusion detection systems. MEP outperforms LGP for three of the considered classes and LGP outperform MEP for two of the classes. MEP classification accuracy is grater than 95% for all considered classes and for three of them is greater than 99.75%.
Ajith Abraham, Crina Grosan
openaire +2 more sources
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina+17 more
wiley +1 more source
Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically.
Parminder Singh+4 more
doaj +1 more source
Cluster Based Cost Efficient Intrusion Detection System For Manet [PDF]
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process.
arxiv
SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks [PDF]
Intrusion Detection Systems are widely used to detect cyberattacks, especially on protocols vulnerable to hacking attacks such as SOME/IP. In this paper, we present a deep learning-based sequential model for offline intrusion detection on SOME/IP application layer protocol.
arxiv