Dissertationen zum Thema „IDRs“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "IDRs" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Bruley, Apolline. „Exploitation de signatures des repliements protéiques pour décrire le continuum ordre/désordre au sein des protéomes“. Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS474.
Der volle Inhalt der QuelleA significant fraction of the proteomes remains unannotated, leaving inaccessible a part of the functional repertoire of life, including molecular innovations with therapeutic or environmental value. Lack of functional annotation is partly due to the limitations of the current approaches in detecting hidden relationships, or to specific features such as disorder. The aim of my PhD thesis was to develop methodological approaches based on the structural signatures of folded domains, in order to further characterize the protein sequences with unknown function even in absence of evolutionary information. First, I developed a scoring system in order to estimate the foldability potential of an amino acid sequence, based on its density in hydrophobic clusters, which mainly correspond to regular secondary structures. I disentangled the continuum between order and disorder, covering various states from extended conformations (random coils) to molten globules and characterize cases of conditional order. Next, I combined this scoring system with the AlphaFold2 (AF2) 3D structure predictions available for 21 reference proteomes. A large fraction of the amino acids with very low AF2 model confidence are included in non-foldable segments, supporting the quality of AF2 as a predictor of disorder. However, within each proteome, long segments with very low AF2 model confidence also exhibit characteristics of soluble, folded domains. This suggests hidden order (conditional or unconditional), which is undetected by AF2 due to lack of evolutionary information, or unrecorded folding patterns. Finally, using these tools, I made a preliminary exploration of unannotated proteins or regions, identified through the development and application of a new annotation workflow. Even though these sequences are enriched in disorder, an important part of them showcases soluble globular-like characteristics. These would make good candidates for further experimental validation and characterization. Moreover, the analysis of experimentally validated de novo genes allowed me to contribute to the still-open debate on the structural features of proteins encoded by these genes, enriched in disorder and displaying a great diversity of structura
Refstie, Hilde. „IDPs redefined – Participatory ActionResearch with urban IDPs in Uganda“. Thesis, Norwegian University of Science and Technology, Department of Geography, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5115.
Der volle Inhalt der QuelleThis dissertation investigates the discourse on Internally Displaced Persons (IDPs) in Uganda and how IDPs in urban areas fit in to the discourse on both the theoretical and practical level. The dissertation reveals that although IDPs in urban areas by definition are included in both international and national IDP definitions, urban IDPs are seen as either economic migrants, or as former IDPs who have now reached a durable solution. The consequences of such exclusion from the IDP label are that IDPs outside camps are not considered for assistance or included in the return and resettlement frameworks or information activities.
The formation of the IDP label in Uganda has been influenced by the government’s approach of control and military presence aimed at keeping people in camps in the north. Consequently, IDPs are perceived entirely as people residing in camps. The humanitarian community has been complicit with the government’s policy of keeping people in camps by limiting assistance to IDPs registered and residing within them. The obvious lack of resources dedicated to protecting IDPs also influences the way the label is shaped. It is challenging to identify IDPs in an urban setting because of lack of registration and information. It is also difficult to determine who are forced migrants, and which of them have reached a durable solution. Consequently, IDPs in Uganda has in practice been redefined to those staying in camps.
Upon acknowledging how the voices of urban IDPs are marginalized within the dominant discourse, phase two of the fieldwork progressed towards influencing this discourse by revealing the political and bureaucratic agency in the processes of labelling creating greater awareness of the processes that serve to exclude urban IDPs from return and resettlement frameworks. By facilitating the mobilization of an urban IDP interest group I together with the community outreach organization Refugee Law Project worked together with urban IDP communities advocating for their rights.
Brandão, José Eduardo Malta de Sá. „Composições de IDSs“. Florianópolis, SC, 2007. http://repositorio.ufsc.br/xmlui/handle/123456789/90293.
Der volle Inhalt der QuelleMade available in DSpace on 2012-10-23T08:11:59Z (GMT). No. of bitstreams: 1 242582.pdf: 1822805 bytes, checksum: 609b5a41dd95627d4cfddc5803190cc7 (MD5)
A crescente necessidade de compartilhamento de informações entre organizações parceiras ou membros de organizações virtuais envolve um grande desafio de segurança. Um dos aspectos chave neste desafio é a construção de sistemas de detecção de intrusão (IDSs) que possam operar em ambientes heterogêneos de larga escala. Isto é particularmente difícil devido ao fato de que as diferentes redes envolvidas usam IDSs que não foram projetados para trabalhar de forma cooperativa. O tema central desta tese é a proposta de uma nova abordagem de monitoramento de segurança baseada em composições de IDSs. Uma composição de IDSs é a combinação de elementos de detecção de intrusão, que podem ser IDSs completos ou suas partes, distribuídos entre redes diferentes, mas que operam de forma cooperativa, formando um sistema unificado. Nesta Tese, as composições de IDSs são construídas usando uma arquitetura orientada a serviços baseada na tecnologia de Web Services. A interoperabilidade entre os diversos elementos de uma composição é obtida a partir do amplo emprego de esforços de padronização, sobretudo da IETF, W3C e OASIS. As composições dinâmicas são suportadas pelo uso da orquestração de serviços. Para viabilizar as composições de IDSs, é proposta neste documento uma infra-estrutura de serviços, capaz de suportar elementos de IDs baseados em softwares prontos (commercial off-the-shelf # COTS), uma necessidade fundamental para prover a interoperabilidade e facilitar a implementação. Nesta Tese também são descritas as implementações de protótipos da infra-estrutura proposta e analisados os resultados obtidos por meio de experimentos com estes protótipos. The growing need for information sharing among partnering organizations or members of virtual organizations poses a great security challenge. One of the key aspects of this challenge is deploying intrusion detection systems (IDS) that can operate in heterogeneous, largescale environments. This is particularly difficult because the different networks involved generally use IDSs that have not been designed to work in a cooperative fashion. This Thesis presents a model for integrating intrusion detection systems in such environments. The main idea of this Thesis is a new security monitoring approach, based on IDSs compositions. A IDS composition is a combination of intrusion detection elements (which can be complete IDS systems or their components) distributed across different networks so that they operate in a cooperative fashion, in order to provide a unified service. On this Thesis, the IDSs compositions are constructed using a service-oriented architecture (SOA), based on the Web Services technology. The necessary interoperability among the elements of the compositions is achieved through the use of standardized specifications, mainly those developed by IETF, W3C and OASIS. Dynamic compositions are supported through service orchestration. To make possible the IDSs compositions, is proposed on this document a services infrastructure that is capable of supporting commercial off-the-shelf (COTS) IDS elements, a crucial feature for providing interoperability and deployability. On this Thesis are also described prototypes implementations, tests and results.
Qaisi, Ahmed Abdulrheem Jerribi. „Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool“. Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Der volle Inhalt der QuelleBergöö, Martin. „IDR "Interaktionsdesignad rädsla"“. Thesis, Malmö högskola, Institutionen för konst, kultur och kommunikation (K3), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23137.
Der volle Inhalt der QuelleNATH, PANDEY ARUNENDRA. „Secure IDMS for Cloud Computing Environment“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121175.
Der volle Inhalt der QuelleSanchez, Laura. „A comparative study of refugees and idps“. Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/506.
Der volle Inhalt der QuelleB.A.
Bachelors
Sciences
Political Science
シャリフ, アシース モハメド, und Mohamed Shareef Asees. „Internally displaced persons (IDPs) and ethnic minorities : a case study of Muslim IDPs in the Puttalam district of Sri Lanka“. Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0, 2014. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12677521/?lang=0.
Der volle Inhalt der QuelleRiveiro, Barciela María del Mar. „Estudio de dos situaciones especiales en pacientes con infección crónica por el virus de la hepatitis B: Eficacia y seguridad de los análogos de nucleós(t)idos de segunda generación en una cohorte de práctica clínica real y nuevos biomarcadores para la identificación de portadores inactivos“. Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/399831.
Der volle Inhalt der QuelleHepatitis B virus (HBV) infection is a worldwide health problem, with around 400 million people chronically infected. In our setting, the prevalence is 0.7% and the majority of subjects are HBeAg negative. In this stage of the disease, one of the most challenging issues is to discern between the inactive carriers, who have a long-term good prognosis of the disease, and patients with HBeAg negative chronic hepatitis B, who are at risk of fibrosis development and therefore may require antiviral therapy. The first study of this thesis is focus on patients undergoing antiviral therapy with second generation nucleos(t)tides analogs (Entecavir and Tenofovir). The hypotheses were that the effectiveness and rate of side effects in daily clinical practice were similar to the registration studies and the validation of the Page-B score for prediction of hepatocellular carcinoma (HCC) development. From the collaborative database CIBERHEP, 609 caucasian subjects with chronic hepatitis B treated with Tenofovir or Entecavir were selected. The rates of biochemical and virological response were very high, and no worsening on renal function was observed. Despite suppression of viral replication, 12 cases of HCC were reported, a number lower to the estimated by the Page-B score. Similar to the original cohort, in the CIBERHEP all patients who developed HCC presented a baseline Page-B punctuation ≥10 points, supporting the previously described 100% negative predictive value of that cut-off. The hypothesis of the second study was that the serum levels of hepatitis B antigen (HBsAg) o core-related antigen (HBcrAg) could be useful for identification of HBV inactive carriers. To achieve this goal, a prospective work with 3 consecutive blood analyses throughout 1 year was carried out. Subjects were classified as inactive carriers (defined as persistently normal alanine transferase levels and HBV DNA ≤2.000 IU/mL) or subjects with HBV activity. Firstly, it was observed that HBsAg levels varied across the different HBV genotypes. This finding hindered the search of a unique HBsAg cut-off for diagnosing the inactive carrier state among the different HBV genotypes. Previously described HBsAg <3 logIU/mL was only useful of genotype D. However, HBcrAg did no vary among genotypes, and on the whole, the diagnostic accuracy of HBcrAg was higher than HBsAg levels. The combination on a single determination of HBcrAg ≤3 logU/mL plus HBV DNA ≤2.000 IU/mL presented a diagnostic accuracy ≥85% in all genotypes except H or F (73%).
Herdenberg, Nils David. „IDPs, Durable Solutions and Citizenship : Perspectives from Ukraine“. Thesis, Uppsala universitet, Kulturgeografiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-333990.
Der volle Inhalt der QuelleCoquerel, Patrick Ramon Stafin. „Parâmetros psicomotores e sociais em idos iron man“. Universidade do Estado de Santa Catarina, 2005. http://tede.udesc.br/handle/handle/392.
Der volle Inhalt der QuelleCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
The objective of this study was to describe the psicomotors and social parameters of an aged competitor tri-athlete of tests of Iron Man. Front to the parameters social and psicomotors, representative aged in the category was structuralized a study of descriptive case the 70-74 years, participant of competitions of Iron Man in the South American, by means of a sampling proposed. The following materials had been used: a) Postural examination fiche of the postures of Miranda (2003); b) Psicomotor examination with Motor Escala for Elderly of Rosa Neto (2002); c) Interview half-structuralized for psicomotor and social profile: it motivates, it stress, clinical history, sportive and socio-economical; d) Formulary of the activities of the life day. The results had disclosed a position inclining of front, with diverse postures shunting lines, a high general motors levels of 120 points, motivated to train and to compete, as much in level conscientious, how much unconscious, as well as it presents a stress and agitated profile.
O objetivo deste estudo foi descrever os parâmetros psicomotores e sociais de um idoso triatleta competidor de provas de Iron Man . Foi estruturado um estudo de caso descritivo frente aos parâmetros psicomotores e sociais do único representante idoso na categoria 70 a 74 anos, participante de competições de Iron Man na América do Sul, mediante uma amostragem de conveniência. Foram utilizados os seguintes materiais: a) Exame postural ficha de anotação dos dados posturais de Miranda (2003); b) Exame psicomotor com a Escala Motora para Terceira Idade (EMTI) de Rosa Neto (2002); c) Entrevista semi-estruturada para perfil psicomotor e social: motivação; estresse, história clínica, esportiva e sócio-econômica; d) Inventário das atividades da vida diária. Os resultados revelaram uma postura anteriorizada, com diversos desvios posturais, uma aptidão motora geral superior de 120 pontos, motivado para treinar e competir, tanto no nível consciente, quanto inconsciente, assim como apresenta um perfil estressado e agitado.
Sandmark, Maria, und Sofia Petermann. „Medledarskapsresan - En idés resa in i två organisationer“. Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23395.
Der volle Inhalt der QuelleFernandez, Maria del Mar, und Ignacio Porres. „An Evaluation of current IDS“. Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11635.
Der volle Inhalt der QuelleWith the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.
Alevizon, John V. „Odds and Ids : a novel“. Virtual Press, 1988. http://liblink.bsu.edu/uhtbin/catkey/539859.
Der volle Inhalt der QuelleDepartment of English
Šišmiš, Lukáš. „Optimalizace IDS/IPS systému Suricata“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445503.
Der volle Inhalt der QuelleZika, Ondřej. „Analýza IDS Prahy a Bratislavy“. Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162145.
Der volle Inhalt der QuelleHamid, Abdalrhman. „Protracted Internal Displacement : A Case Study of Darfur IDPs“. Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80267.
Der volle Inhalt der QuelleDrissi, Mustapha. „La Ville sainte de Mouley Idris du Zerhoun, Maroc“. Lille 3 : ANRT, 1989. http://catalogue.bnf.fr/ark:/12148/cb376046349.
Der volle Inhalt der QuelleMafra, Paulo Manoel. „Comunicação segura na composição de IDSs e seus custos“. Florianópolis, SC, 2006. http://repositorio.ufsc.br/xmlui/handle/123456789/88388.
Der volle Inhalt der QuelleMade available in DSpace on 2012-10-22T08:25:47Z (GMT). No. of bitstreams: 1 236833.pdf: 1167883 bytes, checksum: 325b4964cec8fba25025f9482fa97b01 (MD5)
Os sistemas de detecção de intrusão geralmente são projetados para funcionar solitários em redes locais. Estes sistemas não prevêem a integração com outras ferramentas de detecção de intrusão, nem o uso da infra-estrutura da Internet para correlação de eventos, reduzindo o seu escopo da análise. Este trabalho apresenta um modelo para a comunicação segura entre os componentes de sistemas de detecção de intrusão em ambientes de larga escala utilizando os programas de detecção de intrusão convencionais, com o propósito de formar composições destes sistemas, dispersos geograficamente, e detectar uma quantidade maior de ataques, inclusive ataques distribuídos, através da correlação dos eventos. É introduzido um modelo de segurança fim a fim, utilizando padrões de segurança e a tecnologia de {\it Web Services}. São apresentados os principais esforços presentes na literatura sobre detecção de intrusão distribuída fazendo um comparativo entre as abordagens utilizadas e, então, o modelo de comunicação proposto é descrito. Também são descritos um protótipo desenvolvido, os resultados dos testes efetuados e algumas conclusões sobre o modelo proposto.
Westerberg, Adrian, und Gustav Ung. „Comparing Verification of List Functions in LiquidHaskell and Idris“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255160.
Der volle Inhalt der QuelleFormell verifiering är viktigt för att garantera korrekthet av kritiska datorprogram. LiquidHaskell och Idris är 2 funktionella programmeringsspråk där formell verifiering kan göras med hjälp av språkens typsystem. Denna uppsats undersöker skillnaderna mellan LiquidHaskell och Idris vid verifiering av listfunktioner, gällande expressiveness, annotation overhead och typechecking tider. De använda listfunktionerna och tillhörande specifikationer bestående av korrekthetsegenskaper, valdes omsorgsfullt. Resultaten visade inte på några stora skillnader gällande expressiveness mellan LiquidHaskell och Idris. Gällande annotation overhead och typechecking tider visades Idris vara bättre än LiquidHaskell utan automatiseringsfunktionen PLE. Med PLE visade resultaten inte på några stora skillnader.
Johansson, Fredrik, Jörgen Johansson und Marcus Johansson. „IDS för alla : Intrångsdetekteringssystem för hemmaanvändare“. Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23229.
Der volle Inhalt der QuelleTjhai, Gina C. „Anomaly-based correlation of IDS alarms“. Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Der volle Inhalt der QuelleMonzer, Mohamad-Houssein. „Model-based IDS design pour ICS“. Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT056.
Der volle Inhalt der QuelleIndustrial systems present security risks related to their IT vulnerabilities. These systems, spread over the world, continue to be targets of attacks. While Industrial systems share common vulnerabilities with IT systems, they tend to have more constraints due to the interaction between cyber and physical systems.Intrusion detection systems give visibility to the system and are considered as one of the solutions to detect targeting attacks. Hence, it seems relevant to rely on a physical model of the cyber-physical system to obtain an intrusion detection system (IDS) for industrial systems. Most IDSs are based on rules that define how possible attacks are detected. These rules are generally used to either describe possible attack scenarios on the systems or used to describe the normal system behavior of the system. However, manually creating and maintaining rules for a complex system can prove to be a very tedious and difficult task.This thesis proposes a solution to model ICS and to design specific IDS for industrial systems. A model-based IDS rule generator is also proposed, which converts a system model into anomaly-based IDS rules. Finally, the effectiveness of the generated rules is evaluated
Richardson, Kajsa. „En studie av Idre Fjälls webbplats med fokus på användbarhet“. Thesis, Högskolan Dalarna, Grafisk teknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:du-4219.
Der volle Inhalt der QuelleAhlgren, Thorbjörn. „Institutionalisering på hemmaplan : En idés resa i den sociala barnavården“. Doctoral thesis, Linnéuniversitetet, Institutionen för socialt arbete (SA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36715.
Der volle Inhalt der QuelleShaikley, Layla Karim. „Iraq's housing crisis : upgrading settlements for IDPS (internally displaced persons)“. Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82280.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (p. [74]-[76]).
The most recent war in Iraq has resulted in a large wave of internal and external displacement with increased sectarian violence and ethnic tension. Subsequent conflict has exacerbated conditions within the nation and further increased displacement. Throughout the country, over one million Iraqis are currently displaced. Inadequately supported by infrastructure due to a negligent dictatorship and consecutive wars, over 250 settlements have peppered Baghdad's landscape and aggravated the capital's insufficient infrastructure. It is clear that the rapid rate at which informal settlements for internally displaced persons (IDPs) are being established exceeds the rate in which settlements are forming Many settlements have exhibited user-initiated incremental housing processes. The topic of this thesis is upgrading settlements for IDPs in Baghdad, Iraq through user-initiated methods. Baghdad is facing an overwhelming amount of sub-standard IDP settlements, and while some settlements are turning into slums, other settlements are becoming more durable. Community action can be a solution for the problems addressed in semi-durable settlements that have exhibited enough solidarity through incremental processes to reach a semi-durable state. This thesis examines the solution through three methods. First, it looks at a historical review of incremental housing processes parallel to Iraq's housing policies and history to understand the nation's current housing crisis. It finds that Iraq has struggled in addressing housing needs for the low-income sector since its independence. Following the historical review, this thesis screens IDP settlements in Baghdad to evaluate the feasibility of upgrade for different types of settlement. In the screening process, settlements that exhibit semi-durable characteristics and are available for secure tenure are most eligible for upgrade. One particular semi-durable settlement is studied: Al-Sadeq in Baghdad's peripheries. Al-Sadeq is evaluated based on the following measures of durability: infrastructure, housing, and social networks. As hypothesized, findings supported the role of incremental housing principles and community action to improve the settlement's state of durability. Lessons are extracted from community field research. As hypothesized, social cohesion and community action are the catalysts that allow incremental methods of infrastructure and housing improvements to thrive. This is especially important in a conflict zone as Baghdad, where displacement is often a direct outcome of danger. In such environments, social networks can provide feelings of security to invest in development. Lessons for communities like Al-Sadeq include the power of community action in incremental housing processes and user-initiated development. Lessons from the historical review shed light on the ineffective solutions for mitigating social housing concerns in the nation's past. Lessons for the government in this study challenge the lack of an established tradition of community action in public sector projects in Iraq.
by Layla Karim Shaikley.
S.M.in Architecture Studies
Spoerry, Christian. „Streptococcal immunoglobulin degrading enzymes of the IdeS and IgdE family“. Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-134552.
Der volle Inhalt der QuelleKalerat, Pietres Yothin Sawangdee. „Unmet contraceptive need in Indonesis : an analysis of IDHS 1997 /“. Abstract, 2004. http://mulinet3.li.mahidol.ac.th/thesis/2547/cd372/4638507.pdf.
Der volle Inhalt der QuelleAspernäs, Andreas, und Thommy Simonsson. „IDS on Raspberry Pi : A Performance Evaluation“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43997.
Der volle Inhalt der QuelleDen här rapporten behandlar möjligheten att använda en Raspberry Pi som ett intrångdetekteringssystem i en hemma miljö för att öka nätverkssäkerheten. Fokusen i den här studien ligger på hur väl de två senaste generationerna av Raspberry Pi skulle kunna hantera nätverkstrafik samtidigt som den undersöker nätverkstrafiken och söker efter hot. För att kontrollera hur väl en Raspberry Pi kan fungera som ett intrångdetekteringssystem har en laborationsmiljö upprättats bestående av två fysiska maskiner som vardera används för att virtualisera en virtuell maskin. Tester för att mäta datagenomströmning, processor och minnesbelastning utfördes på var och en av Raspberry Pi. Två modeller av Raspberry Pi användes; Raspberry Pi model b+ och Raspberry Pi 2 model b, både körde operativsystemet Arch Linux ARM. Resultatet av testerna visade att det går att använda båda enheterna för att upprätta ett intrångdetekteringssystem, men det finns vissa begränsningar i enheterna vilket kan begränsa implementationsmöjligheterna. Raspberry Pi 2 model B uppvisade bättre resultat i form av att den är lägre belastad och har en högre datagenomströmning till skillnad från Raspberry Pi model B+. Raspberry Pi 2 model B har nyare och snabbare hårdvara vilket är den troliga orsaken till att den presterar bättre.
Choudhry, Aurang Zeb. „Internally Displaced Persons Rights in Human Rights Perspective(Specifically Focused on Pakistani IDPs Example) : “Basic Human Rights of IDPs to Attain Equality in Dignity and Rights”“. Thesis, Högskolan Dalarna, Socialantropologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:du-5273.
Der volle Inhalt der QuelleJohansson, Söderberg Jenny. „The streptococcal IgG degrading enzyme IdeS : studies on host-pathogen interactions“. Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-53706.
Der volle Inhalt der QuelleVindebro, Reine. „Studies on secreted cysteine proteases of Streptococcus pyogenes : IdeS and SpeB“. Doctoral thesis, Umeå universitet, Institutionen för molekylärbiologi (Medicinska fakulteten), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-88223.
Der volle Inhalt der QuelleSilva, Maria Denise Oliveira da. „Blog, reescrita e referenciação : idas e vindas na construção dos sentidos“. Universidade Federal de Sergipe, 2015. https://ri.ufs.br/handle/riufs/6424.
Der volle Inhalt der QuelleEste trabalho apresenta reflexões e sugestões sobre o ensino da escrita a partir de uma experiência desenvolvida na rede pública estadual de Sergipe. Para tanto, aplicou-se uma proposta de intervenção, durante a qual os alunos criaram um blog de fanfictions onde divulgaram e compartilharam seus escritos. O objetivo deste experimento é contribuir com a ampliação da competência escrita dos alunos a partir das atividades de reescrita e da exploração de algumas estratégias de referenciação presentes nos textos produzidos, além de promover a circularidade e o compartilhamento desses escritos no blog. Para a criação do blog, partiu-se das perspectivas do multiletramento, que envolvem a multiplicidade cultural e semiótica da sociedade. As reflexões sobre a língua partiram das teorias dos gêneros do discurso e da escrita como processo, culminando com os estudos sobre a reescrita e a avaliação. O corpus de análise constituiu-se de cinco produções coletivas elaboradas pelos alunos durante as aulas. Os resultados desta análise apontam para a melhoria da escrita dos alunos, decorrente das atividades de reescrita e da exploração de algumas estratégias de referenciação. Constatou-se, ainda, uma participação mais efetiva dos sujeitos em consequência do uso do blog como ambiente de trocas dialógicas e compartilhamento. Desta experiência, resultou como produto um caderno pedagógico, contendo orientações que podem ser ressignificadas em outras realidades educacionais.
Pascoli, Maria do Carmo. „Idas e vindas : o motivo da viagem em textos literários portugueses“. Programa de Pós-Graduação em Letras e Linguística da UFBA, 2007. http://www.repositorio.ufba.br/ri/handle/ri/11418.
Der volle Inhalt der QuelleApproved for entry into archive by Alda Lima da Silva(sivalda@ufba.br) on 2013-05-27T21:42:55Z (GMT) No. of bitstreams: 1 Maria do Carmo Pascoli.pdf: 985377 bytes, checksum: 2631ccf87eaeafd66cbcdcad7979ae21 (MD5)
Made available in DSpace on 2013-05-27T21:42:55Z (GMT). No. of bitstreams: 1 Maria do Carmo Pascoli.pdf: 985377 bytes, checksum: 2631ccf87eaeafd66cbcdcad7979ae21 (MD5) Previous issue date: 2007
Estudo centrado no motivo da viagem e em sua importância axial na literatura portuguesa, “Idas e Vindas” concentra-se em três momentos: o da expansão marítima, ocorrida a partir dos séculos XV e XVI; a segunda metade do século XIX, quando mais nitidamente se explicita a crise gerada pelo modelo expansionista e pela falência da noção de progresso; e, finalmente, as décadas finais do século XX, quando a reconfiguração da economia mundial, com o desaparecimento de um mundo bipolar, repercute fortemente na cultura. Enfatizando o olhar de quem permanece em terra, à espera dos que partiram, a reflexão segue um fio condutor específico: a intenção de ressaltar, entre as causas determinantes da viagem, a pobreza proveniente de equívocos e descasos administrativos. Busca-se articular história e ficção, de modo a delimitar etapas decisivas na construção da história cultural portuguesa.
Salvador
Bista, Sulabh. „Assessing the Physical Security of IDFs with PSATool: a Case Study“. Digital Commons @ East Tennessee State University, 2015. https://dc.etsu.edu/etd/2605.
Der volle Inhalt der QuelleJohansson, Philip, und Niklas Blomqvist. „An Approach to Achieve DBMS Vendor Independence for Ides AB's Platform“. Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139220.
Der volle Inhalt der QuelleCuomo, Albina. „Il contributo della idro-geomorfologia nella valutazione delle piene in Campania“. Doctoral thesis, Universita degli studi di Salerno, 2012. http://hdl.handle.net/10556/344.
Der volle Inhalt der QuelleItaly and, in particular, the Campania region, has been exposed to Hydraulic Risk since long ago. In hydraulic risk analysis the definition of maximum flood discharge with a specific return time (T) is crucial and, to this aim, the VAPI- Campania procedure (1995) was adopted in the Campania region. The VAPI method is based on a geo-morphoclimatic model, identifying 7 climatic homogenous areas with respect to the rainfall probability density function and 3 classes of permeability for the rainfall-runoff transformation model. At the XXX National Congress on the Hydraulic and Hydraulic Engineering (IDRA 2006), the hydrological working group of Salerno University (Rossi and Villani (2006)), pointed out guidelines for up-dating the VAPI-Campania and, in particular the role of: orographic barriers in the evaluation of intensity and persistence of the extreme rainfalls; and the individuation of hydro-geomorphotypes for the rainfall-runoff modeling at the catchments and sub-catchments scales. In this framework, the present thesis gives a contribution to a hydro-geomorphological approach to achieve the two guidelines mentioned above. This research focuses first on the automatic individuation and objective delimitation of the orographic barriers in order to upgrade the heuristic delimitation (expert judgment) used in the simplified model of orographically induced rainfall of Rossi et al. (2005). The proposed procedure is based on the basic concepts of the hierarchic orometry (hierarchical mountain geomorphometry), prominence and parent relationships, to delineate the 'orographic mountain' in various spatial scale (hierarchical- multiscale approach). Also, the procedure defines the 'morphologic mountains' and its components (ridge, plain and hillslope) using slope, altitude, relief ratio and exposition with respect to the dominant perturbation fronts and its moving direction. The second topic of research deals with the individuation of the hydrogeomorphotypes. To this aim, the prototypal work of Guida et al. (2007), was taken into account as a guideline in the identification of the hydrogeomorphotypes and the decisional scheme of Scherrer and Naef (2003), here modify, allowed the identification of the three dominant runoff mechanisms on the Campania region. In particular, the prototypal procedure of Guida has been here objectified and automatized, defining the 9 elementary landscape forms (Troch et al., 2002), characterized in terms of sub-surface flow and soil moisture storage, under an objectbased GIS environment. The procedure here presented allowed identification on the hydro-geomorphological map, and of the runoff mechanisms: Hortonian overland flow for excess of saturation, subsurface flow, and deep percolation. In order to test the procedure some hydro-geomorphological analysis have been carried out based on data from two instrumented experimental catchments and on rainfall data from the Regional Functional Center of the Campania Civil Protection Sector. The results allowed to calculate the hydrologic index named Runoff Index, which improves the evaluation of the runoff coefficient (Cf) for un-gauged basins. Other analyses were performed on further 4 catchments with similar hydrologic and geologic behavior in order to extended the procedure to the whole Campania region. Also, conceptual discussions on the implementation of the Runoff Index in the rainfall-runoff transformation operated with a largely used hydrologic software, HECHMS, was made, in order to evaluate the feasibility of the procedure proposed in the present research and improve the RI in hydraulic risk evaluation at a regional scale. [edited by author]
X n.s.
SILVA, Aline Lopes da. „MODELO DE IDS PARA USUÁRIOS DE DISPOSITIVOS MÓVEIS“. Universidade Federal do Maranhão, 2008. http://tedebc.ufma.br:8080/jspui/handle/tede/335.
Der volle Inhalt der QuelleMobile devices are increasing common reality in wireless networks and have integrated the wireless environment, helping to ease and to make available information. Meanwhile, the wireless environment is subject to vulnerabilities because of the way of spreading information that is given through the air, and is subject to interception or even information theft. Mobile Devices in addition of its vulnerability to these vulnerabilities common in wireless environments, are devices with some physical limitations such as lack of processing capacity and memory, beyond the limited battery life. These limitations become critical in this kind of environment, when unidentified threats attack are directed mobile devices. It is necessary to develop an intrusion detection system dedicated to these devices to identify intrusive behaviour, taking into account their physical limitations. This work proposes an intrusion detection system (IDS, Intrusion Detection System) for wireless networks and mobile devices. This is an adaptation and extension of NIDIA-IDS (Intrusion Detection System-Network Intrusion Detection System based on Intelligent Agents). The system acts with two processes: the first one is an information tracking on the device performance and the second one is a wireless network traffic monitoring, analyzing both the traffic of monitored devices. As proof of concepts a prototype was developed and some experiments were carried to validate this solution.
Os dispositivos móveis são uma realidade cada vez mais comum em redes wireless e se integraram ao ambiente wireless, contribuindo para facilidade e disponibilidade da informação. Entretanto, o ambiente wireless está sujeito a vulnerabilidades, devido à forma de propagação da informação que se dá através do ar, estando sujeito a intercepção ou até mesmo roubo das informações. Dispositivos móveis além de estarem sujeitos a essas vulnerabilidades comuns em ambientes wireless, são dispositivos com algumas limitações físicas, como pouca capacidade de processamento e memória, além da vida útil de bateria limitada. Estas limitações tornam-se críticas neste tipo ambiente, quando ameaças não identificadas são direcionadas a dispositivos móveis. Torna-se necessário a implementação de sistema de detecção de intrusão voltado para estes dispositivos a fim de identificar comportamentos intrusivos, levando em consideração suas limitações físicas. Este trabalho propõe um sistema de detecção de intrusão (IDS, Intrusion Detection System) em redes wireless destinados a dispositivos móveis como adaptação e extensão do IDS-NIDIA (Intrusion Detection System- Network Intrusion Detection System based on Intelligent Agents). O mecanismo utiliza dois processos: o primeiro faz o monitoramento de informações sobre o comportamento do dispositivo e o segundo através do monitoramento de tráfego da rede wireless, analisando o tráfego destinado e originado aos dispositivos monitorados. A implementação da arquitetura e os testes realizados demonstram a viabilidade da solução.
MORAES, Falkner de Área Leão. „SEGURANÇA E CONFIABILIDADE EM IDS BASEADOS EM AGENTES“. Universidade Federal do Maranhão, 2009. http://tedebc.ufma.br:8080/jspui/handle/tede/1843.
Der volle Inhalt der QuelleMade available in DSpace on 2017-08-21T12:14:23Z (GMT). No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5) Previous issue date: 2009-02-16
Lack of security is a constant concern in open distributed systems. Threats are present within environments insecure, uncertain and constantly changing. Due to this problem, many tools for evaluating vulnerabilities of the network as well as for their protection are being developed as techniques for encryption and software systems such as antivirus, firewall and IDS (Intrusion Detection System). Among these, there are IDS systems that are being conceived, designed and implemented, using techniques executed by agents. However, it is necessary to assure security and reliability of exchanged messages inside IDS. For this purpose, this paper proposes a security solution for IDS based on agents. The proposed solution provides a methodology and a secure mechanism for communication among agents, through information protection configuration mechanisms, authentication and authorization, key control and messages persistence using XML. The proposed solution is implemented as an extension to the IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), whose architecture has an intelligent agent society that communicate in a cooperative way in a distributed environment. The implementation of the prototype and tests proposed in this work show the applicability of the proposed solution.
A falta de segurança é uma preocupação constante em sistemas distribuídos abertos. Ameaças estão presentes dentro de ambientes inseguros, incertos e que mudam constantemente. Devido a esses problemas, diversas ferramentas para avaliação de vulnerabilidades da rede, bem como para sua proteção, estão sendo desenvolvidas como técnicas de criptografia e softwares como antivírus, firewall e IDS (Intrusion Detection System). Dentre estas, destaca-se Sistemas IDS que estão crescentemente sendo concebidos, projetados e implementados, usando técnicas de segurança executadas por agentes. Entretanto, é necessário que a segurança e a confiabilidade das mensagens trocadas dentro de um sistema IDS sejam asseguradas. Para este fim, este trabalho propõe uma solução segura e confiável para IDS baseada em agentes. A solução propõe estabelecer um esquema de execução e comunicação segura dos agentes através de mecanismos de proteção de informações de configuração, autenticação e autorização, controle de chaves e persistência de mensagens do IDS, utilizando XML. A solução proposta é implementada como uma extensão do IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), cuja arquitetura consiste em uma sociedade de agentes inteligentes que se comunicam de forma cooperativa em um ambiente distribuído. A implementação do protótipo e os testes apresentados neste trabalho demonstram a aplicabilidade da solução proposta.
Scrobonia, David. „Rules Based Analysis Engine for Application Layer IDS“. DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1773.
Der volle Inhalt der QuelleCarey, Nathan. „Correlation of Heterogenous IDS Alerts for Attack Detection“. Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15872/1/Nathan_Carey_Thesis.pdf.
Der volle Inhalt der QuelleCarey, Nathan. „Correlation of Heterogenous IDS Alerts for Attack Detection“. Queensland University of Technology, 2004. http://eprints.qut.edu.au/15872/.
Der volle Inhalt der QuelleSulaman, Sardar Muhammad. „An Analysis and Comparison of The Security Features of Firewalls and IDSs“. Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.
Der volle Inhalt der QuelleDimitriadou, Aikaterini. „Heşt Behişt of Idris Bidlisi : the reign of Bayezid II (1481-1512)“. Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/7705.
Der volle Inhalt der QuelleAmoretti, Carolina Friedrich. „Reposi??o de corticoester?ides em crian?as com choque s?ptico“. Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2012. http://tede2.pucrs.br/tede2/handle/tede/1407.
Der volle Inhalt der QuelleObjectives: To evaluate hydrocortisone treatment and response to ACTH adrenal stimulation test, with or without respect to basal cortisol, in children with volume refractory septic shock.Method: Randomized placebo controlled clinical trial, including children admitted to the Pediatric Intensive Care Unit at S?o Lucas Hospital (HSL-PUCRS, Brazil) with a diagnosis of volume refractory septic shock, between Jun/2008 and Sep/2012. Basal cortisol level was determined and, then, ACTH test (1mcg/1,73m2) was performed. Then, patients were randomized to hydrocortisone or placebo treatment groups. Study protocol was approved by the HSL?s ethics committee.Results: Fifty six patients were analyzed. Median age was 5 months old, and mortality was 17.8%. Mortality rate was higher in patients that failed to respond to ACTH test, regardless of treatment (36% versus 6%; p=0.01). There was no difference between treatment groups regarding time and dose of vasoactive drugs, PICU length of stay and mortality, even when those who fail to respond to ACTH test were analyzed separately.Conclusion: Mortality was higher among patients who failed to respond to ACTH stimulation test, regardless of group of treatment. In our study, steroid replacement in children with volume refractory septic shock failed to improve mortality or any other studied outcome. More studies are needed to confirm these results
Objetivo: Avaliar o efeito do tratamento com hidrocortisona e da resposta ao teste de estimula??o adrenal com ACTH, com e sem rela??o ao cortisol basal, em pacientes pedi?tricos com choque s?ptico refrat?rio a volume.M?todo: Ensaio cl?nico randomizado, duplo cego, placebo controlado, incluindo crian?as admitidas na Unidade de Terapia Intensiva Pedi?trica do Hospital S?o Lucas, entre junho/2008 e setembro/2012. Os pacientes tinham diagn?stico de choque s?ptico refrat?rio a volume. Foi dosado cortisol basal e ap?s, realizado o teste de estimula??o com ACTH (1mcg/1,73m2). O paciente era ent?o randomizado para tratamento com hidrocortisona ou placebo. O protocolo de estudo foi aprovado pelo Comit? de ?tica do referido hospital.Resultados: Foram analisadas 56 crian?as. A mediana de idade foi de 5 meses, e a mortalidade foi de 17,8%. A mortalidade foi mais alta entre pacientes que n?o responderam ao teste com ACTH, independente do tratamento recebido (36% versus 6%; p=0,01). N?o houve diferen?a estat?stica entre os pacientes tratados ou n?o com hidrocortisona, com rela??o ? mortalidade, horas e quantidade de drogas vasoativas e tempo de interna??o em UTIP. Este resultado se mant?m, mesmo quando analisados separadamente os pacientes que responderam ou n?o ao teste do ACTH.Conclus?o: Pacientes que n?o respondem a est?mulo com ACTH apresentaram mortalidade aumentada, independente do tratamento recebido. A reposi??o de corticoester?ides em crian?as com choque s?ptico refrat?rio a volume n?o mostrou melhora de mortalidade, ou dos outros desfechos avaliados neste estudo. Novos estudos s?o necess?rios para confirmar estes achados
Himeur, Said. „L'Idrīssisme, matrice orientale et ancrage maghrébin (145/213-762/828) : essai d'une nouvelle approche historiographique“. Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H035.
Der volle Inhalt der QuelleThe image of Idrīs b. 'Abd Allāh (2nd/8th century), probably the first dynast in the country of Maġrib al-Aqṣā, is mainly conveyed by medievalists since the classical Andalusian and Maghrebian historiographies, especially those emanating from Merinid historiographers (7th-9th/13th-15th centuries). These present us with the image of a miraculously escaped fugitive, fleeing the Abbasid authorities and seeking refuge from the Berbers of Awraba in Walīlī, the ancient Roman city. Now, the two recently discovered manuscripts, that of Aḥmad b. Sahl ar-Rāzī (315/927), Kitāb Aḫbār faḫ and that of Abū Al-'Abās b. Ibrāhīm Al-Ḥasanī (352/965), Kitāb al-Maṣābīḥ, give us another image of this emblematic figure of the medieval Maghreb. Indeed, these two sources of inspiration alid us trace the course of Idrīs b. 'Abd Allāh as a missionary engaged in a political-religious movement that is that of the Alids. According to these sources, he managed to ensure a certain continuity of this movement and, subsequently, to anchor his politico-religious project within the Maghreb space. He is not only able to lay the foundations for a state model in Walīlī, but also to offer to the Berbers a new version of Alid-specific Islam whose doctrinal foundation is the attachment to ahl al-Bayt (The family of the Prophet). A version diametrically opposed to that known by the Maghreb Berber tribes under the reign of the Umayyads. Thus, the family-oriented dynastic-doctrinal (ahl-al-Bayt) leadership will be substituted for the first time in the history of Maġrib al-Aqṣā, tribal-clan-tribal leadership (al-āṣabiyya al-qabaliyya). The authors of these two new sources highlight four aspects. First, the orientality ofIdrīs, emphasizing his role as missionary and fighter in the movement alide in the East, before, during and after the battle of the Faḫ. Then, the outline of his political-religious movement and the objectives he defines through his different speeches in Walīlī. Then, Idrīs' strategy towards his Abbasid rivals, among others during the race towards power and its geopolitical stakes of the time. Finally, the supposed politico-religious orientation of the first two sovereign ideals. However, if these two alids works have distinguished themselves by a good historiographical coverage of the period stretching from the Faḫ to Walīlī, they remain limited compared to those of the Merinid authors concerning the period after Walīlī who focus more on the character from Idrīs the son and the city of Fās
Virti, Émerson Salvadori. „Implementação de um IDS utilizando SNMP e lógica difusa“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/11475.
Der volle Inhalt der QuelleThis work develops a study about Computer Network Security through the implementation of an Instruction Detection System (IDS) based on system information captured by the SNMP protocol. To reach a reduction in the number of false positive and false negative, a peculiar problem to the majority of the IDS, it is used fuzzy logic and the assistance of Network Security Administrators. Thus it is possible to build an Intrusion Detection System better adjusted to the network characteristics that must be monitored. At last, by monitoring a production network, it is evaluated the overall security improvement obtained by the IDS proposed in this work and considers its adoption as a complementary network security mechanism.
Ovšonka, Daniel. „Obfuskace síťového provozu pro zabránění jeho detekce pomocí IDS“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236209.
Der volle Inhalt der QuelleAussibal, Julien. „Rsids : un IDS distribué basé sur le framework CVSS“. Pau, 2009. http://www.theses.fr/2009PAUU3044.
Der volle Inhalt der QuelleIntrusion detection is a method that ensures the availability concept in systems and computer networks. This availability is generally undermined by various anomalies. These anomalies can be caused either legitimately unintended result has operations working on these systems (broken link, traffic, or. . . ), so illegitimate with malicious operations designed to undermine the availability of these systems. The implementation of these various anomalies detection tools, such as IDS (Intrusion Detection System), contribute to early identification of these anomalies and to block them. This thesis has enabled us to develop a new generation platform to generate legitimate and illegitimate anomalies. This work was carried out under the project METROSEC. This platform has enabled us to obtain various traffic captures containing these anomalies. The various illegimitate anomalies were performed with classic tools to make Denial of Service like TFN2k or Trinoo. Legitimate Anormalies were also conducted with flash crowd phenomenon. All these catch real traffic were used in further research on intrusion detection for the evaluation of new methods of detection. In a second part, the implementation of a new detection tool seems necessary to improve the quality of detection of these anomalies. This new distributed IDS, called RSIDS (Risk Scored Intrusion Detection System), will retrieve the results of a multitude of heterogeneous probes. The use of probes will remove the risk of false alarms. Indeed, a probe is not able to detect all anomalies that occur on a system or network. Each alert provided by its probes will be evaluated according to their degree of dangerousness. The assessment of dangerousness based on the framework CVSS (Common Vulnerability Scoring System)
Čmela, Libor. „Přestupní terminál IDS JMK u žel. stanice Brno - Řečkovice“. Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2012. http://www.nusl.cz/ntk/nusl-225526.
Der volle Inhalt der Quelle