Auswahl der wissenschaftlichen Literatur zum Thema „IDRs“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "IDRs" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "IDRs"

1

Han, Bingqing, Chongjiao Ren, Wenda Wang, Jiashan Li und Xinqi Gong. „Computational Prediction of Protein Intrinsically Disordered Region Related Interactions and Functions“. Genes 14, Nr. 2 (08.02.2023): 432. http://dx.doi.org/10.3390/genes14020432.

Der volle Inhalt der Quelle
Annotation:
Intrinsically Disordered Proteins (IDPs) and Regions (IDRs) exist widely. Although without well-defined structures, they participate in many important biological processes. In addition, they are also widely related to human diseases and have become potential targets in drug discovery. However, there is a big gap between the experimental annotations related to IDPs/IDRs and their actual number. In recent decades, the computational methods related to IDPs/IDRs have been developed vigorously, including predicting IDPs/IDRs, the binding modes of IDPs/IDRs, the binding sites of IDPs/IDRs, and the molecular functions of IDPs/IDRs according to different tasks. In view of the correlation between these predictors, we have reviewed these prediction methods uniformly for the first time, summarized their computational methods and predictive performance, and discussed some problems and perspectives.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Coskuner-Weber, Orkid, und Vladimir N. Uversky. „Current Stage and Future Perspectives for Homology Modeling, Molecular Dynamics Simulations, Machine Learning with Molecular Dynamics, and Quantum Computing for Intrinsically Disordered Proteins and Proteins with Intrinsically Disordered Regions“. Current Protein & Peptide Science 25, Nr. 2 (Februar 2024): 163–71. http://dx.doi.org/10.2174/0113892037281184231123111223.

Der volle Inhalt der Quelle
Annotation:
Abstract:: The structural ensembles of intrinsically disordered proteins (IDPs) and proteins with intrinsically disordered regions (IDRs) cannot be easily characterized using conventional experimental techniques. Computational techniques complement experiments and provide useful insights into the structural ensembles of IDPs and proteins with IDRs. Herein, we discuss computational techniques such as homology modeling, molecular dynamics simulations, machine learning with molecular dynamics, and quantum computing that can be applied to the studies of IDPs and hybrid proteins with IDRs. We also provide useful future perspectives for computational techniques that can be applied to IDPs and hybrid proteins containing ordered domains and IDRs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Liu, Meili, Akshaya K. Das, James Lincoff, Sukanya Sasmal, Sara Y. Cheng, Robert M. Vernon, Julie D. Forman-Kay und Teresa Head-Gordon. „Configurational Entropy of Folded Proteins and Its Importance for Intrinsically Disordered Proteins“. International Journal of Molecular Sciences 22, Nr. 7 (26.03.2021): 3420. http://dx.doi.org/10.3390/ijms22073420.

Der volle Inhalt der Quelle
Annotation:
Many pairwise additive force fields are in active use for intrinsically disordered proteins (IDPs) and regions (IDRs), some of which modify energetic terms to improve the description of IDPs/IDRs but are largely in disagreement with solution experiments for the disordered states. This work considers a new direction—the connection to configurational entropy—and how it might change the nature of our understanding of protein force field development to equally well encompass globular proteins, IDRs/IDPs, and disorder-to-order transitions. We have evaluated representative pairwise and many-body protein and water force fields against experimental data on representative IDPs and IDRs, a peptide that undergoes a disorder-to-order transition, for seven globular proteins ranging in size from 130 to 266 amino acids. We find that force fields with the largest statistical fluctuations consistent with the radius of gyration and universal Lindemann values for folded states simultaneously better describe IDPs and IDRs and disorder-to-order transitions. Hence, the crux of what a force field should exhibit to well describe IDRs/IDPs is not just the balance between protein and water energetics but the balance between energetic effects and configurational entropy of folded states of globular proteins.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ahmed, Shehab S., Zaara T. Rifat, Ruchi Lohia, Arthur J. Campbell, A. Keith Dunker, M. Sohel Rahman und Sumaiya Iqbal. „Characterization of intrinsically disordered regions in proteins informed by human genetic diversity“. PLOS Computational Biology 18, Nr. 3 (11.03.2022): e1009911. http://dx.doi.org/10.1371/journal.pcbi.1009911.

Der volle Inhalt der Quelle
Annotation:
All proteomes contain both proteins and polypeptide segments that don’t form a defined three-dimensional structure yet are biologically active—called intrinsically disordered proteins and regions (IDPs and IDRs). Most of these IDPs/IDRs lack useful functional annotation limiting our understanding of their importance for organism fitness. Here we characterized IDRs using protein sequence annotations of functional sites and regions available in the UniProt knowledgebase (“UniProt features”: active site, ligand-binding pocket, regions mediating protein-protein interactions, etc.). By measuring the statistical enrichment of twenty-five UniProt features in 981 IDRs of 561 human proteins, we identified eight features that are commonly located in IDRs. We then collected the genetic variant data from the general population and patient-based databases and evaluated the prevalence of population and pathogenic variations in IDPs/IDRs. We observed that some IDRs tolerate 2 to 12-times more single amino acid-substituting missense mutations than synonymous changes in the general population. However, we also found that 37% of all germline pathogenic mutations are located in disordered regions of 96 proteins. Based on the observed-to-expected frequency of mutations, we categorized 34 IDRs in 20 proteins (DDX3X, KIT, RB1, etc.) as intolerant to mutation. Finally, using statistical analysis and a machine learning approach, we demonstrate that mutation-intolerant IDRs carry a distinct signature of functional features. Our study presents a novel approach to assign functional importance to IDRs by leveraging the wealth of available genetic data, which will aid in a deeper understating of the role of IDRs in biological processes and disease mechanisms.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Medvedev, Kirill E., Jimin Pei und Nick V. Grishin. „DisEnrich: database of enriched regions in human dark proteome“. Bioinformatics 38, Nr. 7 (30.01.2022): 1870–76. http://dx.doi.org/10.1093/bioinformatics/btac051.

Der volle Inhalt der Quelle
Annotation:
Abstract Motivation Intrinsically disordered proteins (IDPs) are involved in numerous processes crucial for living organisms. Bias in amino acid composition of these proteins determines their unique biophysical and functional features. Distinct intrinsically disordered regions (IDRs) with compositional bias play different important roles in various biological processes. IDRs enriched in particular amino acids in human proteome have not been described consistently. Results We developed DisEnrich—the database of human proteome IDRs that are significantly enriched in particular amino acids. Each human protein is described using Gene Ontology (GO) function terms, disorder prediction for the full-length sequence using three methods, enriched IDR composition and ranks of human proteins with similar enriched IDRs. Distribution analysis of enriched IDRs among broad functional categories revealed significant overrepresentation of R- and Y-enriched IDRs in metabolic and enzymatic activities and F-enriched IDRs in transport. About 75% of functional categories contain IDPs with IDRs significantly enriched in hydrophobic residues that are important for protein–protein interactions. Availability and implementation The database is available at http://prodata.swmed.edu/DisEnrichDB/. Supplementary information Supplementary data are available at Bioinformatics Advances online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Felli, Isabella C., Wolfgang Bermel und Roberta Pierattelli. „Exclusively heteronuclear NMR experiments for the investigation of intrinsically disordered proteins: focusing on proline residues“. Magnetic Resonance 2, Nr. 1 (01.07.2021): 511–22. http://dx.doi.org/10.5194/mr-2-511-2021.

Der volle Inhalt der Quelle
Annotation:
Abstract. NMR represents a key spectroscopic technique that contributes to the emerging field of highly flexible, intrinsically disordered proteins (IDPs) or protein regions (IDRs) that lack a stable three-dimensional structure. A set of exclusively heteronuclear NMR experiments tailored for proline residues, highly abundant in IDPs/IDRs, are presented here. They provide a valuable complement to the widely used approach based on amide proton detection, filling the gap introduced by the lack of amide protons in proline residues within polypeptide chains. The novel experiments have very interesting properties for the investigations of IDPs/IDRs of increasing complexity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Saito, Akatsuki, Maya Shofa, Hirotaka Ode, Maho Yumiya, Junki Hirano, Toru Okamoto und Shige H. Yoshimura. „How Do Flaviviruses Hijack Host Cell Functions by Phase Separation?“ Viruses 13, Nr. 8 (28.07.2021): 1479. http://dx.doi.org/10.3390/v13081479.

Der volle Inhalt der Quelle
Annotation:
Viral proteins interact with different sets of host cell components throughout the viral life cycle and are known to localize to the intracellular membraneless organelles (MLOs) of the host cell, where formation/dissolution is regulated by phase separation of intrinsically disordered proteins and regions (IDPs/IDRs). Viral proteins are rich in IDRs, implying that viruses utilize IDRs to regulate phase separation of the host cell organelles and augment replication by commandeering the functions of the organelles and/or sneaking into the organelles to evade the host immune response. This review aims to integrate current knowledge of the structural properties and intracellular localizations of viral IDPs to understand viral strategies in the host cell. First, the properties of viral IDRs are reviewed and similarities and differences with those of eukaryotes are described. The higher IDR content in viruses with smaller genomes suggests that IDRs are essential characteristics of viral proteins. Then, the interactions of the IDRs of flaviviruses with the MLOs of the host cell are investigated with emphasis on the viral proteins localized in the nucleoli and stress granules. Finally, the possible roles of viral IDRs in regulation of the phase separation of organelles and future possibilities for antiviral drug development are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kastano, Kristina, Gábor Erdős, Pablo Mier, Gregorio Alanis-Lobato, Vasilis J. Promponas, Zsuzsanna Dosztányi und Miguel A. Andrade-Navarro. „Evolutionary Study of Disorder in Protein Sequences“. Biomolecules 10, Nr. 10 (06.10.2020): 1413. http://dx.doi.org/10.3390/biom10101413.

Der volle Inhalt der Quelle
Annotation:
Intrinsically disordered proteins (IDPs) contain regions lacking intrinsic globular structure (intrinsically disordered regions, IDRs). IDPs are present across the tree of life, with great variability of IDR type and frequency even between closely related taxa. To investigate the function of IDRs, we evaluated and compared the distribution of disorder content in 10,695 reference proteomes, confirming its high variability and finding certain correlation along the Euteleostomi (bony vertebrates) lineage to number of cell types. We used the comparison of orthologs to study the function of disorder related to increase in cell types, observing that multiple interacting subunits of protein complexes might gain IDRs in evolution, thus stressing the function of IDRs in modulating protein-protein interactions, particularly in the cell nucleus. Interestingly, the conservation of local compositional biases of IDPs follows residue-type specific patterns, with E- and K-rich regions being evolutionarily stable and Q- and A-rich regions being more dynamic. We provide a framework for targeted evolutionary studies of the emergence of IDRs. We believe that, given the large variability of IDR distributions in different species, studies using this evolutionary perspective are required.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alshehri, Manal A., Manee M. Manee, Mohamed B. Al-Fageeh und Badr M. Al-Shomrani. „Genomic Analysis of Intrinsically Disordered Proteins in the Genus Camelus“. International Journal of Molecular Sciences 21, Nr. 11 (03.06.2020): 4010. http://dx.doi.org/10.3390/ijms21114010.

Der volle Inhalt der Quelle
Annotation:
Intrinsically disordered proteins/regions (IDPs/IDRs) fail to fold completely into 3D structures, but have major roles in determining protein function. While natively disordered proteins/regions have been found to fulfill a wide variety of primary cellular roles, the functions of many disordered proteins in numerous species remain to be uncovered. Here, we perform the first large-scale study of IDPs/IDRs in the genus Camelus, one of the most important mammalians in Asia and North Africa, in order to explore the biological roles of these proteins. The study includes the prediction of disordered proteins/regions in Camelus species and in humans using multiple state-of-the-art prediction tools. Additionally, we provide a comparative analysis of Camelus and Homo sapiens IDPs/IDRs for the sake of highlighting the distinctive use of disorder in each genus. Our findings indicate that the human proteome is more disordered than the Camelus proteome. Gene Ontology analysis also revealed that Camelus IDPs are enriched in glutathione catabolism and lactose biosynthesis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Chiang, Wan-Chin, Ming-Hsuan Lee, Tsai-Chen Chen und Jie-rong Huang. „Interactions between the Intrinsically Disordered Regions of hnRNP-A2 and TDP-43 Accelerate TDP-43′s Conformational Transition“. International Journal of Molecular Sciences 21, Nr. 16 (18.08.2020): 5930. http://dx.doi.org/10.3390/ijms21165930.

Der volle Inhalt der Quelle
Annotation:
Most biological functions involve protein–protein interactions. Our understanding of these interactions is based mainly on those of structured proteins, because encounters between intrinsically disordered proteins (IDPs) or proteins with intrinsically disordered regions (IDRs) are much less studied, regardless of the fact that more than half eukaryotic proteins contain IDRs. RNA-binding proteins (RBPs) are a large family whose members almost all have IDRs in addition to RNA binding domains. These IDRs, having low sequence similarity, interact, but structural details on these interactions are still lacking. Here, using the IDRs of two RBPs (hnRNA-A2 and TDP-43) as a model, we demonstrate that the rate at which TDP-43′s IDR undergoes the neurodegenerative disease related α-helix-to-β-sheet transition increases in relation to the amount of hnRNP-A2′s IDR that is present. There are more than 1500 RBPs in human cells and most of them have IDRs. RBPs often join the same complexes to regulate genes. In addition to the structured RNA-recognition motifs, our study demonstrates a general mechanism through which RBPs may regulate each other’s functions through their IDRs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "IDRs"

1

Bruley, Apolline. „Exploitation de signatures des repliements protéiques pour décrire le continuum ordre/désordre au sein des protéomes“. Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS474.

Der volle Inhalt der Quelle
Annotation:
Une fraction significative des protéomes reste non annotée, laissant inaccessible une partie du répertoire fonctionnel de la vie, incluant des innovations moléculaires ayant une valeur thérapeutique ou environnementale. Le manque d'annotation fonctionnelle est en partie dû aux limites des approches actuelles pour la détection de relations cachées, ou à des caractéristiques spécifiques telles que le désordre. L'objectif de ma thèse a été de développer des approches méthodologiques reposant sur les signatures structurales des domaines repliés, afin de caractériser plus avant les séquences protéiques dont la fonction est inconnue, même en l'absence d'informations évolutives. Tout d'abord, j'ai développé un score permettant d'estimer le potentiel de repliement d'une séquence d'acides aminés, basé sur sa densité en amas hydrophobes, correspondant principalement aux structures secondaires régulières. J'ai décrit le continuum entre l'ordre et le désordre, couvrant différents états allant des conformations étendues aux globules fondus et ai caractérisé des cas d'ordre conditionnel. Ensuite, j'ai combiné ce score avec les prédictions de structure 3D d'AlphaFold2 (AF2) disponibles pour 21 protéomes de référence. Une grande fraction des acides aminés des modèles AF2 associés à un très faible index de confiance est incluse dans des segments non repliables, soutenant la qualité d'AF2 comme prédicteur du désordre. Cependant, dans chaque protéome, de longs segments repliables avec des prédictions AF2 de faible confiance présentent également des caractéristiques de domaines solubles et repliés. Cela suggère un ordre caché (conditionnel ou inconditionnel), qui n'est pas détecté par AF2 en raison du manque d'informations évolutives, ou des motifs de repliement non répertoriés. Enfin, à l'aide de ces outils, j'ai effectué une exploration préliminaire de protéines ou de régions non annotées, identifiées via le développement et l'application d'une nouvelle procédure d'annotation. Bien que ces séquences soient enrichies en désordre, une part importante d'entre elles présente des caractéristiques de type globulaire soluble. Ces séquences constituent de bons candidats pour de futures validations et caractérisations expérimentales. De plus, l'analyse de gènes de novo validés expérimentalement m'a permis de contribuer au débat encore ouvert sur les caractéristiques structurales des protéines codées par ces gènes, qui présentent un enrichissement en désordre et une grande diversité d'états structuraux
A significant fraction of the proteomes remains unannotated, leaving inaccessible a part of the functional repertoire of life, including molecular innovations with therapeutic or environmental value. Lack of functional annotation is partly due to the limitations of the current approaches in detecting hidden relationships, or to specific features such as disorder. The aim of my PhD thesis was to develop methodological approaches based on the structural signatures of folded domains, in order to further characterize the protein sequences with unknown function even in absence of evolutionary information. First, I developed a scoring system in order to estimate the foldability potential of an amino acid sequence, based on its density in hydrophobic clusters, which mainly correspond to regular secondary structures. I disentangled the continuum between order and disorder, covering various states from extended conformations (random coils) to molten globules and characterize cases of conditional order. Next, I combined this scoring system with the AlphaFold2 (AF2) 3D structure predictions available for 21 reference proteomes. A large fraction of the amino acids with very low AF2 model confidence are included in non-foldable segments, supporting the quality of AF2 as a predictor of disorder. However, within each proteome, long segments with very low AF2 model confidence also exhibit characteristics of soluble, folded domains. This suggests hidden order (conditional or unconditional), which is undetected by AF2 due to lack of evolutionary information, or unrecorded folding patterns. Finally, using these tools, I made a preliminary exploration of unannotated proteins or regions, identified through the development and application of a new annotation workflow. Even though these sequences are enriched in disorder, an important part of them showcases soluble globular-like characteristics. These would make good candidates for further experimental validation and characterization. Moreover, the analysis of experimentally validated de novo genes allowed me to contribute to the still-open debate on the structural features of proteins encoded by these genes, enriched in disorder and displaying a great diversity of structura
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Refstie, Hilde. „IDPs redefined – Participatory ActionResearch with urban IDPs in Uganda“. Thesis, Norwegian University of Science and Technology, Department of Geography, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5115.

Der volle Inhalt der Quelle
Annotation:

This dissertation investigates the discourse on Internally Displaced Persons (IDPs) in Uganda and how IDPs in urban areas fit in to the discourse on both the theoretical and practical level. The dissertation reveals that although IDPs in urban areas by definition are included in both international and national IDP definitions, urban IDPs are seen as either economic migrants, or as former IDPs who have now reached a durable solution. The consequences of such exclusion from the IDP label are that IDPs outside camps are not considered for assistance or included in the return and resettlement frameworks or information activities.

The formation of the IDP label in Uganda has been influenced by the government’s approach of control and military presence aimed at keeping people in camps in the north. Consequently, IDPs are perceived entirely as people residing in camps. The humanitarian community has been complicit with the government’s policy of keeping people in camps by limiting assistance to IDPs registered and residing within them. The obvious lack of resources dedicated to protecting IDPs also influences the way the label is shaped. It is challenging to identify IDPs in an urban setting because of lack of registration and information. It is also difficult to determine who are forced migrants, and which of them have reached a durable solution. Consequently, IDPs in Uganda has in practice been redefined to those staying in camps.

Upon acknowledging how the voices of urban IDPs are marginalized within the dominant discourse, phase two of the fieldwork progressed towards influencing this discourse by revealing the political and bureaucratic agency in the processes of labelling creating greater awareness of the processes that serve to exclude urban IDPs from return and resettlement frameworks. By facilitating the mobilization of an urban IDP interest group I together with the community outreach organization Refugee Law Project worked together with urban IDP communities advocating for their rights.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Brandão, José Eduardo Malta de Sá. „Composições de IDSs“. Florianópolis, SC, 2007. http://repositorio.ufsc.br/xmlui/handle/123456789/90293.

Der volle Inhalt der Quelle
Annotation:
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro de Tecnológico. Programa de Pós-Graduação em Engenharia Elétrica
Made available in DSpace on 2012-10-23T08:11:59Z (GMT). No. of bitstreams: 1 242582.pdf: 1822805 bytes, checksum: 609b5a41dd95627d4cfddc5803190cc7 (MD5)
A crescente necessidade de compartilhamento de informações entre organizações parceiras ou membros de organizações virtuais envolve um grande desafio de segurança. Um dos aspectos chave neste desafio é a construção de sistemas de detecção de intrusão (IDSs) que possam operar em ambientes heterogêneos de larga escala. Isto é particularmente difícil devido ao fato de que as diferentes redes envolvidas usam IDSs que não foram projetados para trabalhar de forma cooperativa. O tema central desta tese é a proposta de uma nova abordagem de monitoramento de segurança baseada em composições de IDSs. Uma composição de IDSs é a combinação de elementos de detecção de intrusão, que podem ser IDSs completos ou suas partes, distribuídos entre redes diferentes, mas que operam de forma cooperativa, formando um sistema unificado. Nesta Tese, as composições de IDSs são construídas usando uma arquitetura orientada a serviços baseada na tecnologia de Web Services. A interoperabilidade entre os diversos elementos de uma composição é obtida a partir do amplo emprego de esforços de padronização, sobretudo da IETF, W3C e OASIS. As composições dinâmicas são suportadas pelo uso da orquestração de serviços. Para viabilizar as composições de IDSs, é proposta neste documento uma infra-estrutura de serviços, capaz de suportar elementos de IDs baseados em softwares prontos (commercial off-the-shelf # COTS), uma necessidade fundamental para prover a interoperabilidade e facilitar a implementação. Nesta Tese também são descritas as implementações de protótipos da infra-estrutura proposta e analisados os resultados obtidos por meio de experimentos com estes protótipos. The growing need for information sharing among partnering organizations or members of virtual organizations poses a great security challenge. One of the key aspects of this challenge is deploying intrusion detection systems (IDS) that can operate in heterogeneous, largescale environments. This is particularly difficult because the different networks involved generally use IDSs that have not been designed to work in a cooperative fashion. This Thesis presents a model for integrating intrusion detection systems in such environments. The main idea of this Thesis is a new security monitoring approach, based on IDSs compositions. A IDS composition is a combination of intrusion detection elements (which can be complete IDS systems or their components) distributed across different networks so that they operate in a cooperative fashion, in order to provide a unified service. On this Thesis, the IDSs compositions are constructed using a service-oriented architecture (SOA), based on the Web Services technology. The necessary interoperability among the elements of the compositions is achieved through the use of standardized specifications, mainly those developed by IETF, W3C and OASIS. Dynamic compositions are supported through service orchestration. To make possible the IDSs compositions, is proposed on this document a services infrastructure that is capable of supporting commercial off-the-shelf (COTS) IDS elements, a crucial feature for providing interoperability and deployability. On this Thesis are also described prototypes implementations, tests and results.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Qaisi, Ahmed Abdulrheem Jerribi. „Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool“. Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Der volle Inhalt der Quelle
Annotation:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original IDS data into a new container (Digital Evidence Bag) that has a structure based upon standard forensic processes. The aim is to develop a method to improve the current IDS database function in a forensic manner. This database will be optimised for future, forensic, analysis. Since evidence validity is always an issue, a secondary aim of this research is to develop a new monitoring scheme. This is to provide the necessary evidence to prove that an attacker had surveyed the network prior to the attack. To achieve this, we will set up a network that will be monitored by multiple IDSs. Open source tools will be used to carry input validation attacks into the network including SQL injection. We will design a new tool to obtain the original data in order to store it within the proposed DEB. This tool will collect the data from several databases of the different IDSs. We will assume that the IDS will not have been compromised.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bergöö, Martin. „IDR "Interaktionsdesignad rädsla"“. Thesis, Malmö högskola, Institutionen för konst, kultur och kommunikation (K3), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23137.

Der volle Inhalt der Quelle
Annotation:
This essay focuses on the possibilities and problems that come with having teleportation mixed with horror and fear and not having monsters in fear games. How it is to play a horror game without enemies and just being able as an Interactiondesigner to relay on the psychological feeling within the player, if the feeling is more than enough if the player him self get to fantasies and let their deepest fright feelings take over. Is there no difference if there are monsters/enemies or not. Is fright and fear already there before you encountering the enemies? These questions are answered as the paper also presents a game in the shape of a course that has been paralleled worked with. The world with the complete and finished game have bin done in the Hammer editor which the game HalfLife2 (VU games/Valve Software, 2004) is built on. The finished game is a result of several user tests from the prototype game and user questionnaires. Fear games are mainly built on humans’ psychological feelings, the imaginations and how one feel. Through strong usage and building upon these main factors to create fear I have worked from that perspective and investigated how I by best possible means, should do to create fear to fright players by not using enemies as main frightening objects. Focus has been on the narrative of both visual and auditive narration. I have also given an account of the advantage and disadvantages with working with the tool I have chosen, how it has affected my work and my result. The Result turned out to be even better than I had in mind and a positive attitude towards my game from all the test persons. They thought it was a good example that a horror game is not bound to have monsters in order to fright the player. I got a loot of good feedback, response and ideas of what I could improve and what was already good. Some wanted more light effects on the first part and others less sound in the last part. By listening to the test persons I started to create and shape the final version of the game. Everyone became scared and felt more or less frightened through all four parts of the game. I also got positive feedback on my theory from the test persons, that teleportation mixed with horror and fear is something that they could consider using more in games and that this was a good start in the right direction.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

NATH, PANDEY ARUNENDRA. „Secure IDMS for Cloud Computing Environment“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121175.

Der volle Inhalt der Quelle
Annotation:
Current practices includes the integration of IDMS system and OpenStack for easy, better, balanced provisioning, identity management and user management for different types of users in order to securely access the service on cloud platform. These solutions will provide the basic building block structure which provides the motivation to enterprises to come in, out, around the cloud services. Based the research artifacts, design challenges and some current constraints, we have built these cure IDMS for cloud environment under architecture of “CryptoNET™ Security Providers”. Secure IDMS is designed by considering the SCIM schema and OpenStack cloud platform to offer better user management, secure authentication, enhanced security components, secure communication, controlled attributes and synchronized data in order to provide secure services trousers in cloud environment. Security model is based on type of users identity in OpenStack, based on roles. This enables to control and provide different types of user needs as Software as a Services(SaaS), better web application interaction including better provisioning/deprovisioing, secure identity information storage and better access control “role based-RBAC” as Platform as a Services(PaaS). Secure IDMS, provides more solutions for problems that cover the Identity and Access Management (IAM) rather than Managed Identity Services (MIS). Based on cloud IAM challenges and requirements for financial institutions, our design artifact was also evaluated. We considered central identity management approach based on security policy implementation. This research will brings the reader to understand secure IDMS platform with basic real world implementation and motivates the reader to study more cloud challenges, security enhancements and future guidelines for additional research in this area.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sanchez, Laura. „A comparative study of refugees and idps“. Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/506.

Der volle Inhalt der Quelle
Annotation:
There is a grave concern for the life, liberty and security of individuals who have been forced to leave their homes and have become dispersed within their native countries and throughout the Asian continent. These internally displaced persons and refugees are the subject of this study. Some of the themes that will be discussed include: civil war, human rights violations and the economy, since these are the problems affecting the populations of Afghanistan, Pakistan and Myanmar. These case studies are of particular interest because Afghanistan is where most refugees come from, Myanmar has the longest-running military regime and Pakistan hosts the most refugees in the world. All three case studies are currently in a state of civil war, are breeding grounds for violations of human rights and have corrupt economies. Thus, the goal is to end armed conflict, to put an end to the human rights violations that come with it and to restructure the economies in each of these nation states so that the internally displaced persons and refugees can be repatriated, since displacement has become too much of a burden for Afghanistan, Pakistan and Myanmar's neighboring countries, who have been taking in all of the refugees from said countries. Theoretically, if the issues causing displacement were to be solved, then the countries that host refugees would be able to concentrate on their own populations. This study can potentially address the gap between knowledge, policy formation, and policy implementation to realize the goals of the international community in dealing with the displacement crisis.
B.A.
Bachelors
Sciences
Political Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

シャリフ, アシース モハメド, und Mohamed Shareef Asees. „Internally displaced persons (IDPs) and ethnic minorities : a case study of Muslim IDPs in the Puttalam district of Sri Lanka“. Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0, 2014. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Riveiro, Barciela María del Mar. „Estudio de dos situaciones especiales en pacientes con infección crónica por el virus de la hepatitis B: Eficacia y seguridad de los análogos de nucleós(t)idos de segunda generación en una cohorte de práctica clínica real y nuevos biomarcadores para la identificación de portadores inactivos“. Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/399831.

Der volle Inhalt der Quelle
Annotation:
La hepatitis B es un problema de salud mundial, con unos 400 millones de personas infectadas crónicamente. En nuestro medio se calcula una prevalencia del 0.7%, siendo la mayoría de los sujetos HBeAg negativo. En esta fase de la infección, uno de los retos es distinguir entre aquellos sujetos portadores inactivos, que presentarán un buen pronóstico de la enfermedad a largo plazo, y los pacientes con hepatitis crónica HBeAg negativo, que tienen riesgo de desarrollar fibrosis hepática y por tanto precisar tratamiento antiviral. El primer trabajo se centró en pacientes bajo tratamiento antiviral con análogos de nucleós(t)idos de segunda generación (Entecavir y Tenofovir). Las hipótesis del mismo fueron que la eficacia y tasa de efectos adversos en práctica clínica era similar a la de los estudios de registro y la validación del modelo Page-B para predicción del riesgo de carcinoma hepatocelular (CHC). Para dicho fin se analizó la base CIBERHEP que incluye sujetos con infección crónica por el VHB, seleccionándose un total de 609 pacientes caucásicos en tratamiento con Tenofovir o Entecavir. Las tasas de respuesta virológica y bioquímica fueron altas, con pocos efectos adversos y discontinuación de tratamiento, sin observarse deterioro de la función renal. A pesar de la supresión de la replicación viral, se observaron 12 casos de CHC, número inferior a los estimados por la puntuación Page-B. Al igual que en la cohorte original, todos aquellos sujetos que presentaron CHC tenían basalmente una puntuación Page-B ≥10 puntos, confirmándose el valor predictivo negativo del 100% de dicho punto de corte. La hipótesis del segundo de los estudios, fue que los niveles séricos de antígeno de superficie (HBsAg) o antígeno relacionado con el core (HBcrAg) podrían ser útiles para identificar a los verdaderos portadores inactivos del VHB. Para ello se realizó un estudio prospectivo con al 3 determinaciones analíticas en 1 año para caracterizar a los sujetos como portadores inactivos (niveles de alanino transferasa persistentemente normales y ADN VHB≤2.000 UI/mL) o con actividad por el VHB. En primer lugar se observó que los niveles de HBsAg estaban influidos el por genotipo del VHB, dato que dificultó la búsqueda de un único punto de corte con altos índices diagnósticos en todos los genotipos, siendo el HBsAg <3 logUI/mL útil sólo para el genotipo D. Por contra, los niveles de HBcrAg no difirieron entre los diferentes genotipos, siendo la exactitud diagnóstica para la identificación de portadores inactivos mayor que los niveles de HBsAg. La combinación en una única determinación de HBcrAg ≤3 logU/mL más ADN VHB ≤2.000 UI/mL presentó una exactitud diagnóstica >85% en todos los genotipos excepto el H o F (73%).
Hepatitis B virus (HBV) infection is a worldwide health problem, with around 400 million people chronically infected. In our setting, the prevalence is 0.7% and the majority of subjects are HBeAg negative. In this stage of the disease, one of the most challenging issues is to discern between the inactive carriers, who have a long-term good prognosis of the disease, and patients with HBeAg negative chronic hepatitis B, who are at risk of fibrosis development and therefore may require antiviral therapy. The first study of this thesis is focus on patients undergoing antiviral therapy with second generation nucleos(t)tides analogs (Entecavir and Tenofovir). The hypotheses were that the effectiveness and rate of side effects in daily clinical practice were similar to the registration studies and the validation of the Page-B score for prediction of hepatocellular carcinoma (HCC) development. From the collaborative database CIBERHEP, 609 caucasian subjects with chronic hepatitis B treated with Tenofovir or Entecavir were selected. The rates of biochemical and virological response were very high, and no worsening on renal function was observed. Despite suppression of viral replication, 12 cases of HCC were reported, a number lower to the estimated by the Page-B score. Similar to the original cohort, in the CIBERHEP all patients who developed HCC presented a baseline Page-B punctuation ≥10 points, supporting the previously described 100% negative predictive value of that cut-off. The hypothesis of the second study was that the serum levels of hepatitis B antigen (HBsAg) o core-related antigen (HBcrAg) could be useful for identification of HBV inactive carriers. To achieve this goal, a prospective work with 3 consecutive blood analyses throughout 1 year was carried out. Subjects were classified as inactive carriers (defined as persistently normal alanine transferase levels and HBV DNA ≤2.000 IU/mL) or subjects with HBV activity. Firstly, it was observed that HBsAg levels varied across the different HBV genotypes. This finding hindered the search of a unique HBsAg cut-off for diagnosing the inactive carrier state among the different HBV genotypes. Previously described HBsAg <3 logIU/mL was only useful of genotype D. However, HBcrAg did no vary among genotypes, and on the whole, the diagnostic accuracy of HBcrAg was higher than HBsAg levels. The combination on a single determination of HBcrAg ≤3 logU/mL plus HBV DNA ≤2.000 IU/mL presented a diagnostic accuracy ≥85% in all genotypes except H or F (73%).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Herdenberg, Nils David. „IDPs, Durable Solutions and Citizenship : Perspectives from Ukraine“. Thesis, Uppsala universitet, Kulturgeografiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-333990.

Der volle Inhalt der Quelle
Annotation:
This study explores how Donbass IDPs in Kyiv view the role of the state in relation to ‘durable solutions’ to their displacement. Specifically, it examines the expectations on the state as a provider of rights and entitlements vis-à- vis IDPs. Drawing on semi-structured interviews with Donbas IDPs, experiences of displacement and perceptions of durable solutions and citizen-state relations are exemplified. The data collection and analysis methodologies applied allow for the elicitation of the views and opinions of IDPs, in an attempt to mitigate vertical policy-making. The concepts of citizenship, state and sovereignty are applied to analyze the relationship between IDPs and the state. Further, the IASC framework for durable solutions to internal displacement is used to as a structure to outline the views of the IDPs. The results show a large discrepancy between the expectations of the respondents on the states’ role in durable solutions to displacement, and the experience of this in reality. Furthermore, the results reveal high levels of discontent, resignation and apathy towards the state as a provider of durable solutions, especially in terms of returning to Donbass.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "IDRs"

1

Jennifer, Stafford, National Drug and Alcohol Research Centre (Australia) und Illicit Drug Reporting System (Australia), Hrsg. Australian drug trends 2005: Findings from the Illicit Drug Reporting System (IDRS). Sydney: National Drug and Alcohol Research Centre, UNSW, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jenkinson, Rebecca. Victorian drug trends 2002: Findings from the Illicit Drug Reporting System (IDRS). Sydney, NSW: National Drug & Alcohol Research Centre, University of NSW, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Stafford, Jennifer. Australian drug trends 2010: Findings from the Illicit Drug Reporting System (IDRS). Sydney, NSW: National Drug and Alcohol Research Centre, University of New South Wales, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Fetherston, James. WA drug trends 2003: Findings from the Illicit Drug Reporting System (IDRS). [Sydney]: National Drug and Alcohol Research Centre, University of New South Wales, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bruno, Raimondo. Tasmanian drug trends 2003: Findings from the Illicit Drug Reporting System (IDRS). [Sydney, N.S.W]: National Drug and Alcohol Research Centre, University of New South Wales, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jennifer, Stafford, National Drug and Alcohol Research Centre (Australia) und Illicit Drug Reporting System (Australia), Hrsg. Australian drug trends 2004: Findings from the Illicit Drug Reporting System (IDRS). Sydney: National Drug and Alcohol Research Centre, UNSW, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fetherston, James. West Australian drug trends 2002: Findings from the Illicit Drug Reporting System (IDRS). Sydney, NSW: National Drug and Alcohol Research Centre, UNSW, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Amanda, Roxburgh, Hrsg. New South Wales drug trends 2002: Findings from the illicit drug reporting dystem (IDRS). Sydney: National Drug and Alcohol Research Centre, University of New South Wales, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Mahdavīʹnizhād, Mīnā. Idrīs. Tihrān: Nashr-i ʻAlī, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Araujo, Jorge Ribadeneira. Tiempos idos--. Quito, Ecuador: [s.n., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "IDRs"

1

Burkart, Nadia, Maximilian Franz und Marco F. Huber. „Explanation Framework for Intrusion Detection“. In Machine Learning for Cyber Physical Systems, 83–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.

Der volle Inhalt der Quelle
Annotation:
AbstractMachine learning and deep learning are widely used in various applications to assist or even replace human reasoning. For instance, a machine learning based intrusion detection system (IDS) monitors a network for malicious activity or specific policy violations. We propose that IDSs should attach a sufficiently understandable report to each alert to allow the operator to review them more efficiently. This work aims at complementing an IDS by means of a framework to create explanations. The explanations support the human operator in understanding alerts and reveal potential false positives. The focus lies on counterfactual instances and explanations based on locally faithful decision-boundaries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Walther, Wiebke. „Idrīs, Yūsuf“. In Kindlers Literatur Lexikon (KLL), 1. Stuttgart: J.B. Metzler, 2020. http://dx.doi.org/10.1007/978-3-476-05728-0_1528-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Nagahama, Masatsugu. „IDUS: Introduction“. In Advanced Therapeutic Endoscopy for Pancreatico-Biliary Diseases, 179–81. Tokyo: Springer Japan, 2017. http://dx.doi.org/10.1007/978-4-431-56009-8_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wurzenberger, Markus, Max Landauer, Agron Bajraktari und Florian Skopik. „Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation“. In Cybersecurity of Digital Service Chains, 136–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.

Der volle Inhalt der Quelle
Annotation:
AbstractIntrusion Detection Systems (IDSs) monitor all kinds of IT infrastructures to automatically detect malicious activities related to cyber attacks. Unfortunately, especially anomaly-based IDS are known to produce large numbers of alerts, including false positives, that often become overwhelming for manual analysis. However, due to a fast changing threat landscape, quickly evolving attack techniques, and ever growing number of vulnerabilities, novel anomaly detection systems that enable detection of unknown attacks are indispensable. Therefore, to reduce the number of alerts that have to be reviewed by security analysts, aggregation methods have been developed for filtering, grouping, and correlating alerts. Yet, existing techniques either rely on manually defined attack scenarios or require specific alert formats, such as IDMEF that includes IP addresses. This makes the application of existing aggregation methods infeasible for alerts from host-based or anomaly-based IDSs that frequently lack such network-related data. In this chapter, we present a domain-independent alert aggregation technique that enables automatic attack pattern mining and generation of actionable CTI. The chapter describes the concept of the proposed alert aggregation process as well as a dashboard that enables visualization and filtering of the results. Finally, the chapter demonstrates all features in course of an application example.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Tobias, Michael Charles. „The Ides, 2015“. In Codex Orféo, 107–8. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30622-3_39.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gunnerson, Eric. „IDEs and Utilities“. In A Programmer’s Guide to C# 5.0, 421–22. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4594-0_41.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sitnikovski, Boro. „Programming in Idris“. In Introduction to Dependent Types with Idris, 51–79. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9259-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sitnikovski, Boro. „Proving in Idris“. In Introduction to Dependent Types with Idris, 81–116. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9259-4_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Holehouse, Alex S. „IDPs and IDRs in biomolecular condensates“. In Intrinsically Disordered Proteins, 209–55. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-12-816348-1.00007-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zheng, Wenwei, und Hoi Sung Chung. „Single-molecule fluorescence studies of IDPs and IDRs“. In Intrinsically Disordered Proteins, 93–136. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-12-816348-1.00004-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "IDRs"

1

Xiao, Xiao, und Yilong Lu. „Compact Circularly Polarized Smart Antenna System for CubeSat IDRS Application“. In 2018 IEEE International Conference on Computational Electromagnetics (ICCEM). IEEE, 2018. http://dx.doi.org/10.1109/compem.2018.8496731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wu, Xinsong, Yeping He und Zhouyi Zhou. „A State-Adaptive Access Control Model for Web-Based IDRS System“. In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.32.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhang, Youhui, Hongyi Wang, Yu Gu und Dongsheng Wang. „IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI“. In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.59.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Onashoga, Adebukola, Adebayo Akinde und Adesina Sodiya. „A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems“. In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3372.

Der volle Inhalt der Quelle
Annotation:
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode of data collection, the techniques for analysis, and the security of these intelligent codes. Their strengths and problems are stated wherever applicable. Furthermore, suggested ways of improving on current MA-IDS designs are presented in order to achieve an efficient mobile agent-based IDS for future security of distributed network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Quincozes, Silvio E., Célio Albuquerque, Diego Passos und Daniel Mossé. „ERENO: An Extensible Tool For Generating Realistic IEC-61850 Intrusion Detection Datasets“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224642.

Der volle Inhalt der Quelle
Annotation:
Os Sistemas de Detecção de Intrusão (IDSs) são componentes essenciais para lidar com ataques às redes baseadas na norma IEC-61850. No entanto, empregar IDSs em tais redes é um desafio. Uma questão importante é a falta de dados representativos e realistas sobre ataques aos protocolos IEC-61850. Neste trabalho, propomos uma ferramenta extensível que simula o tráfego da rede da subestacão de forma realista para produzir atributos representativos. Como prova de conceito, uma linha de transmissão brasileira foi simulada, gerando-se datasets com 4,4 GB, incluindo 7 tipos de ataque. Os resultados com atributos propostos revelam um ganho de desempenho de IDS baseados em aprendizado de máquina que evoluiu de 52,24% para 99,46%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saheed, Y. K., R. D. Magaji, A. Tosho und O. B. Longe,. „Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things“. In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.

Der volle Inhalt der Quelle
Annotation:
Intrusion Detection Systems (IDSs) are widely used in various computer networks with the goal of spotting cyber threats and potential incidents. Collaborative intrusion detection networks (CIDSs) have been developed to augment the detection power of a single IDS by allowing IDS nodes to exchange data. The Internet of Things (IoT) can be thought of as a network or connectivity of sensors and actuators that share data in a unique way. Blockchain technology has been applied in a variety of fields to foster trust and data protection by enabling participants to trade transactions and communicate information while preserving a level of trust, integrity, and greater transparency. However, there are numerous security concerns associated with the implementation architectures and technologies that will form the Internet of Things' backbone. Hence, this paper proposes a machine learning technique leveraging on blockchain technology with IDS for detecting attacks on IoT. In this paper, we used Naïve Bayes (NB), K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) models for performing the experiment on NSLKDD dataset. The experimental findings for KNN model achieved 99.6% detection rate with a false alarm rate of 0.4. The NB and SVM models also gave competitive results. Keywords: Machine Learning, Blockchain, Intrusion Detection System, Internet of Things, K-Nearest, Online Safety, Neighbor, Collaborative IDS
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Mafra, Paulo M., Joni da Silva Fraga, Vinícius Moll und Altair Olivo Santin. „POLVO-IIDS: Um Sistema de Detecção de Intrusão Inteligente Baseado em Anomalias“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2008. http://dx.doi.org/10.5753/sbseg.2008.20888.

Der volle Inhalt der Quelle
Annotation:
Os sistemas de detecção de intrusão (IDS) têm como atribuição a identificação de ataques e ameaças aos sistemas computacionais. Adicionalmente, os IDSs podem desempenhar funções de prevenção a intrusão (IPS), incluíndo-se ações pro-ativas às intrusões. Um problema recorrente destes sistemas de detecção de intrusão é a dificuldade de diferenciar ataques de acessos legítimos. Muitos sistemas utilizam assinaturas de ataques conhecidos, contudo não conseguem identificar variações destes ataques nem novos ataques. Este artigo apresenta um modelo de sistema de detecção de intrusão que classifica mensagens por análise comportamental como normal ou anômala. Para detecção de anomalias são utilizadas duas técnicas de inteligência artificial chamadas support vector machine (SVM) e redes neurais de Kohonen (KNN). O uso destas técnicas em conjunto visa melhorar a taxa de acerto do IDS desenvolvido, identificando ataques conhecidos ou novos em tempo real.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bonifácio da Silva Júnior, José, Edward David Moreno und Ricardo Ferreira dos Santos. „Compactação do Algoritmo de Comparação de Strings do Snort para o uso na Memória Compartilhada de GPUs“. In XVIII Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2017. http://dx.doi.org/10.5753/wscad.2017.237.

Der volle Inhalt der Quelle
Annotation:
A tarefa de comparar assinaturas de ataques com pacotes de redes em um Intrusion Detection System (IDS) consome bastante tempo de CPU. Para amenizar esse problema, tem-se tentado paralelizar o motor de comparação dos IDSs transferindo sua execução da CPU para a GPU. Este artigo mostra o processamento em paralelo dos dados no algoritmo de comparação de string Aho-Corasick e propõe compactar a Tabela de Transição de Estados desse algoritmo a fim de possibilitar o uso dele na memória compartilhada. A paralelização foi feita através da plataforma CUDA da NVIDIA e executada nas diversas memórias da GPU. O algoritmo AC foi compactado e executado na memória compartilhada, alcançando, em seu melhor resultado, um ganho de desempenho de 73% em relação às outras memórias da GPU e o algoritmo compactado chegou a ser 56 vezes mais rápido que sua versão serial. Com isso, pode-se perceber que o uso da compactação na memória compartilhada torna-se uma solução adequada para acelerar o processamento de IDSs que necessitem de agilidade na busca por padrões.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Valentim, Paulo E., Reinaldo B. Braga und Antonio W. Oliveira. „Um Testbed para o Ensino de Abordagens de IDS Baseadas em IA em Redes Emuladas“. In Congresso sobre Tecnologias na Educação. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctrle.2023.232915.

Der volle Inhalt der Quelle
Annotation:
Nos últimos anos, houve um aumento significativo no tráfego da internet, impulsionado pela pandemia global e pela crescente importância das atividades online. Como resultado desse crescimento, o número de crimes cibernéticos também aumentou. Nesse contexto, os Sistemas de Detecção de Intrusão (IDSs) precisam melhorar a precisão da detecção e reduzir as taxas de falsos alarmes. Este trabalho apresenta um testbed baseado em rede emulada para o ensino de abordagens IDS baseadas em Inteligência Artificial (IA). Como resultado, foi desenvolvido um ambiente de interface escalável e de alto nível, que permite à comunidade se concentrar em suas abordagens com menos preocupações com problemas relacionados ao ambiente de teste.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Konrath, Marlom Alves, Josué Sberb, Eduardo Isaia Filho, Luciano Paschoal Gaspary und Liane Tarouco. „E-Sentry+: Um IDS Baseado em Rede com Suporte à Especificação em Alto Nível de Assinaturas de Ataque“. In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/sbseg.2002.21269.

Der volle Inhalt der Quelle
Annotation:
O aumento da utilização das redes de computadores e o crescimento dos serviços por elas suportados têm causado um aumento no número de incidentes de segurança. Os sistemas de detecção de intrusão (IDS) têm sido usados, nesse contexto, para identificar atividades maliciosas como sondagens e ataques. No caso dos IDSs baseados em assinatura, é preciso descrever essas atividades para que eles sejam capazes de monitorar a sua ocorrência. A maioria dos sistemas, no entanto, não oferece flexibilidade a esse processo de especificação, além de exigir a utilização de notações em baixo nível. Esse trabalho apresenta um sistema de detecção de intrusão, o E-Sentry+, que aborda esse problema ao explorar uma linguagem em alto nível para a representação de assinaturas.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "IDRs"

1

Clark, Louise, Jo Carpenter und Joe Taylor. Learning From Responsiveness to a Rapidly Evolving Context: IDRC’s Covid-19 Responses for Equity Programme. Institute of Development Studies, Juni 2022. http://dx.doi.org/10.19088/core.2022.004.

Der volle Inhalt der Quelle
Annotation:
This report summarises key institutional lessons that emerged from a Learning Journey commissioned by the International Development Research Centre (IDRC) for its Covid-19 Responses for Equity (CORE) programme. Learning Journeys are a research method developed by the Institute of Development Studies (IDS) to support collaborative scoping processes and provide participants with structured spaces to learn, discuss issues, and to reflect on their day-to-day work and how to apply learning. CORE was designed as a rapid response mechanism to address the sudden global shifts caused by the Covid-19 pandemic. The initiative supports 21 research projects with Southern partners across 42 countries. It seeks to understand the socioeconomic impacts of the pandemic, improve existing responses, and generate better policy options for recovery. The CORE Learning Journey was managed by the ‘Knowledge Translation’ (KT) supplier for CORE, the UK-based IDS. It brought together grantees, IDRC senior management, Regional Directors (RD), Program Officers (PO), and IDS staff, to share experiences and reflect on the successes and challenges of the CORE programme. It was framed around a central learning question: What are the key lessons to emerge from the IDRC experience of funding CORE as a responsive mechanism to provide innovative Southern-led policy and practice solutions in the context of a rapid onset and rapidly evolving global crisis?
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

R.T. Rosche. IDCS NETWORK ALTERNATIVES ANALYSIS. Office of Scientific and Technical Information (OSTI), Februar 1995. http://dx.doi.org/10.2172/883443.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lambert, D. P. Ventilation criteria for IDMS facility. Office of Scientific and Technical Information (OSTI), Juli 1996. http://dx.doi.org/10.2172/392769.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Combaz, Emilie, Melanie Connor und James Georgalakis. Knowledge Translation in the Global South: An Exploratory Mapping of the Literature. Institute of Development Studies, Juli 2023. http://dx.doi.org/10.19088/ids.2023.033.

Der volle Inhalt der Quelle
Annotation:
This paper maps the literature that focuses on knowledge translation (KT) in the global South. It was commissioned as part of the KT in the Global South research project, supported by Canada’s International Development Research Centre (IDRC) and led by the Institute of Development Studies (IDS). The trilingual systematised review helps discern where information about KT is missing, emerging, or well-established, and highlights information on what the KT strategies employed are, where, how, by whom, and for whom.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, Januar 2022. http://dx.doi.org/10.31979/mti.2022.2014.

Der volle Inhalt der Quelle
Annotation:
As an emerging field, the Internet of Vehicles (IoV) has a myriad of security vulnerabilities that must be addressed to protect system integrity. To stay ahead of novel attacks, cybersecurity professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, including Intrusion Detection System (IDSs), by implementing anomaly detection, which differentiates benign data packets from malicious ones. For an IDS to best predict anomalies, the model is trained on data that is typically pre-processed through normalization and feature selection/reduction. These pre-processing techniques play an important role in training a neural network to optimize its performance. This research studies the impact of applying normalization techniques as a pre-processing step to learning, as used by the IDSs. The impacts of pre-processing techniques play an important role in training neural networks to optimize its performance. This report proposes a Deep Neural Network (DNN) model with two hidden layers for IDS architecture and compares two commonly used normalization pre-processing techniques. Our findings are evaluated using accuracy, Area Under Curve (AUC), Receiver Operator Characteristic (ROC), F-1 Score, and loss. The experimentations demonstrate that Z-Score outperforms no-normalization and the use of Min-Max normalization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Imrich, K. J., und C. F. Jenkins. Final examination of IDMS corrosion coupons. Office of Scientific and Technical Information (OSTI), September 1993. http://dx.doi.org/10.2172/10108783.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Varadhan, K., S. Hares und Y. Rekhter. BGP4/IDRP for IP---OSPF Interaction. RFC Editor, Dezember 1994. http://dx.doi.org/10.17487/rfc1745.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

R.T. Rosche. IDCS NETWORK AND STORAGE DATA RATE ANALYSIS. Office of Scientific and Technical Information (OSTI), Februar 1995. http://dx.doi.org/10.2172/883440.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lambert, D. Cylinder supplied ammonia scrubber testing in IDMS. Office of Scientific and Technical Information (OSTI), August 1994. http://dx.doi.org/10.2172/72726.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

UK, Institute of Development Studies. IDS Annual Review 2021–22. Institute of Development Studies, September 2022. http://dx.doi.org/10.19088/ids.2022.054.

Der volle Inhalt der Quelle
Annotation:
It has been a year marked by conflict, climate change, and Covid-19 – intersecting crises that intensify and entrench longer-term vulnerabilities. As we highlight in the IDS 2021–22 Annual Review, these uncertain times demand that development research be done differently, with new approaches to learning and knowledge exchange that engage policy actors and diverse communities. Our work in the past year has centred on navigating uncertainties and crises, and despite the ongoing effects of Covid-19 and the challenge of major cuts to UK Government aid funding, IDS has made exciting progress. Read the 2021–22 Annual Review to find out more.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie