Results 61 to 70 of about 162,879 (307)

A cognitive based Intrusion detection system

open access: yes, 2020
Intrusion detection is one of the primary mechanisms to provide computer networks with security. With an increase in attacks and growing dependence on various fields such as medicine, commercial, and engineering to give services over a network, securing ...
Menhaj, Mohammad Bagher   +1 more
core  

Perancangan Dan Analisis Sistem Pendeteksi Intrusi Berbasis Network Intrusion Detection System (Nids) Pada Sistem Keamanan Jaringan Komputer [PDF]

open access: yes, 2013
Network intrusion detection system is a system that can detect illegal accesses or intrusions happened in a computer network. Actually, there are many types of intrusion detection systems and the differences are based on how network administrators ...
Gozali, F. (Ferrianto)   +1 more
core  

An overview of recent advances in intrusion detection [PDF]

open access: yes, 2008
The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus.
Cornforth, David   +2 more
core   +1 more source

Emerging role of ARHGAP29 in melanoma cell phenotype switching

open access: yesMolecular Oncology, EarlyView.
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster   +3 more
wiley   +1 more source

Intrusion Detection Systems

open access: yes, 2010
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to ...
Bazara I. A. Barry, H. Anthony Chan
openaire   +3 more sources

Adaptaquin is selectively toxic to glioma stem cells through disruption of iron and cholesterol metabolism

open access: yesMolecular Oncology, EarlyView.
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié   +16 more
wiley   +1 more source

A survey of intrusion detection system technologies [PDF]

open access: yes, 2016
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting ...
Heenan, Ross, Moradpoor, Naghmeh
core  

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

open access: yes, 2016
In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system.
Abed, Amr S.   +2 more
core   +1 more source

Feasibility of a ctDNA multigenic panel for non‐small‐cell lung cancer early detection and disease surveillance

open access: yesMolecular Oncology, EarlyView.
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande   +11 more
wiley   +1 more source

Evaluation of Machine Learning Algorithms for Intrusion Detection System

open access: yes, 2018
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task.
Alkasassbeh, Mouhammd   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy