Results 201 to 210 of about 11,445 (258)

Nanotherapies for Atherosclerosis: Targeting, Catalysis, and Energy Transduction

open access: yesAdvanced Healthcare Materials, EarlyView.
Atherosclerosis management is hindered by poor drug targeting and plaque heterogeneity. Nanotechnology overcomes these barriers via three core strategies: (1) target‐engineered nanocarriers that achieve lesion‐specific precision via ligand modification, biomimetic camouflage, stimuli‐responsive release, and self‐propelling nanomotors; (2) catalytic ...
Yuqi Yang   +4 more
wiley   +1 more source

Packed for Ossification: High‐Density Bioprinting of hPDC Spheroids in HAMA Toward Endochondral Ossification

open access: yesAdvanced Healthcare Materials, EarlyView.
Human periosteum‐derived cell spheroids bioprinted at high density within a hyaluronic acid matrix promote fusion and hypertrophic cartilage formation in vitro. Early encapsulation enhances spheroid interaction and matrix maturation, generating scalable cartilage templates intended for endochondral bone regeneration.
Ane Albillos Sanchez   +6 more
wiley   +1 more source

Counselors network for intrusion detection

International Journal of Network Management, 2020
SummaryIntrusion detection systems (IDSs) are a fundamental component of defense solutions. In particular, IDSs aim to detect malicious activities on computer systems and networks by relying on data classification models built from a training dataset. However, classifiers' performance can vary for each attack pattern.
Silvio E. Quincozes   +5 more
openaire   +1 more source

Network intrusion detection

IEEE Network, 1994
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators.
Biswanath Mukherjee   +2 more
openaire   +1 more source

Hybrid network Intrusion Detection

2011 IEEE 7th International Conference on Intelligent Computer Communication and Processing, 2011
In this paper we present a novel Intrusion Detection System which uses a hybrid approach based on a pattern matching engine and a neural network functioning in parallel to improve the detection efficiency. The attacks that this module is able to detect will be presented, as well as the methods used.
Cristina Amza   +2 more
openaire   +1 more source

An efficient network intrusion detection

Computer Communications, 2010
Exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network Intrusion Detection system (LNID) is proposed for detecting such attacks on Telnet traffic. It characterizes normal traffic behavior and computes the anomaly score of a packet based on the
Chia-Mei Chen   +2 more
openaire   +1 more source

The intrusion detection in mobile sensor network

Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, 2010
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can be effective for intrusion detection. In response to the recent surge of interest in mobile sensor applications, this paper studies the intrusion detection problem in a mobile
Gabriel Yik Keung   +2 more
openaire   +2 more sources

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection

2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy