Academic literature on the topic 'IDS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IDS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IDS"
Ho, Catherine C., and Daniel J. Bernard. "Bone Morphogenetic Protein 2 Acts via Inhibitor of DNA Binding Proteins to Synergistically Regulate Follicle-Stimulating Hormone β Transcription with Activin A." Endocrinology 151, no. 7 (May 12, 2010): 3445–53. http://dx.doi.org/10.1210/en.2010-0071.
Full textSingh, Suman. "IDS with Hybrid ID3 Algorithm." International Journal of Computer Applications 64, no. 17 (February 15, 2013): 12–15. http://dx.doi.org/10.5120/10725-5656.
Full textLin, Xiao-Ming, Cheng-Ye Ji, Wen-Jing Liu, Zhu Long, and Xiao-Yi Shen. "Levels of serum transferrin receptor and its response to Fe-supplement in Fe-deficient children." British Journal of Nutrition 96, no. 6 (December 2006): 1134–39. http://dx.doi.org/10.1017/bjn20061954.
Full textShen, Shigen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han, and Qiying Cao. "Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/179839.
Full textCortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine, and Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models." Journal of Healthcare Engineering 2018 (October 14, 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.
Full textKanakogi, Kenta, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, and Nobukazu Yoshioka. "Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques." Information 12, no. 8 (July 26, 2021): 298. http://dx.doi.org/10.3390/info12080298.
Full textZhou, Quan, Ye-Dong Mei, Huai-Jie Yang, and Ya-Ling Tao. "Inhibitor of DNA-binding family regulates the prognosis of ovarian cancer." Future Oncology 17, no. 15 (May 2021): 1889–906. http://dx.doi.org/10.2217/fon-2020-1006.
Full textWhite, Arisa. "Fake IDs." Ecotone 14, no. 1 (2019): 104–12. http://dx.doi.org/10.1353/ect.2019.0025.
Full textPeters, Barry. "IDS News." Institute of Development Studies Bulletin 3, no. 1 (May 22, 2009): 37–44. http://dx.doi.org/10.1111/j.1759-5436.1970.mp3001007.x.
Full textPeters, Barry. "IDS NEWS." Institute of Development Studies Bulletin 3, no. 3 (May 22, 2009): 56–62. http://dx.doi.org/10.1111/j.1759-5436.1971.mp3003010.x.
Full textDissertations / Theses on the topic "IDS"
Monzer, Mohamad-Houssein. "Model-based IDS design pour ICS." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT056.
Full textIndustrial systems present security risks related to their IT vulnerabilities. These systems, spread over the world, continue to be targets of attacks. While Industrial systems share common vulnerabilities with IT systems, they tend to have more constraints due to the interaction between cyber and physical systems.Intrusion detection systems give visibility to the system and are considered as one of the solutions to detect targeting attacks. Hence, it seems relevant to rely on a physical model of the cyber-physical system to obtain an intrusion detection system (IDS) for industrial systems. Most IDSs are based on rules that define how possible attacks are detected. These rules are generally used to either describe possible attack scenarios on the systems or used to describe the normal system behavior of the system. However, manually creating and maintaining rules for a complex system can prove to be a very tedious and difficult task.This thesis proposes a solution to model ICS and to design specific IDS for industrial systems. A model-based IDS rule generator is also proposed, which converts a system model into anomaly-based IDS rules. Finally, the effectiveness of the generated rules is evaluated
Fernandez, Maria del Mar, and Ignacio Porres. "An Evaluation of current IDS." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11635.
Full textWith the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.
Alevizon, John V. "Odds and Ids : a novel." Virtual Press, 1988. http://liblink.bsu.edu/uhtbin/catkey/539859.
Full textDepartment of English
Šišmiš, Lukáš. "Optimalizace IDS/IPS systému Suricata." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445503.
Full textZika, Ondřej. "Analýza IDS Prahy a Bratislavy." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162145.
Full textJohansson, Fredrik, Jörgen Johansson, and Marcus Johansson. "IDS för alla : Intrångsdetekteringssystem för hemmaanvändare." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23229.
Full textTjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Full textAspernäs, Andreas, and Thommy Simonsson. "IDS on Raspberry Pi : A Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43997.
Full textDen här rapporten behandlar möjligheten att använda en Raspberry Pi som ett intrångdetekteringssystem i en hemma miljö för att öka nätverkssäkerheten. Fokusen i den här studien ligger på hur väl de två senaste generationerna av Raspberry Pi skulle kunna hantera nätverkstrafik samtidigt som den undersöker nätverkstrafiken och söker efter hot. För att kontrollera hur väl en Raspberry Pi kan fungera som ett intrångdetekteringssystem har en laborationsmiljö upprättats bestående av två fysiska maskiner som vardera används för att virtualisera en virtuell maskin. Tester för att mäta datagenomströmning, processor och minnesbelastning utfördes på var och en av Raspberry Pi. Två modeller av Raspberry Pi användes; Raspberry Pi model b+ och Raspberry Pi 2 model b, både körde operativsystemet Arch Linux ARM. Resultatet av testerna visade att det går att använda båda enheterna för att upprätta ett intrångdetekteringssystem, men det finns vissa begränsningar i enheterna vilket kan begränsa implementationsmöjligheterna. Raspberry Pi 2 model B uppvisade bättre resultat i form av att den är lägre belastad och har en högre datagenomströmning till skillnad från Raspberry Pi model B+. Raspberry Pi 2 model B har nyare och snabbare hårdvara vilket är den troliga orsaken till att den presterar bättre.
SILVA, Aline Lopes da. "MODELO DE IDS PARA USUÁRIOS DE DISPOSITIVOS MÓVEIS." Universidade Federal do Maranhão, 2008. http://tedebc.ufma.br:8080/jspui/handle/tede/335.
Full textMobile devices are increasing common reality in wireless networks and have integrated the wireless environment, helping to ease and to make available information. Meanwhile, the wireless environment is subject to vulnerabilities because of the way of spreading information that is given through the air, and is subject to interception or even information theft. Mobile Devices in addition of its vulnerability to these vulnerabilities common in wireless environments, are devices with some physical limitations such as lack of processing capacity and memory, beyond the limited battery life. These limitations become critical in this kind of environment, when unidentified threats attack are directed mobile devices. It is necessary to develop an intrusion detection system dedicated to these devices to identify intrusive behaviour, taking into account their physical limitations. This work proposes an intrusion detection system (IDS, Intrusion Detection System) for wireless networks and mobile devices. This is an adaptation and extension of NIDIA-IDS (Intrusion Detection System-Network Intrusion Detection System based on Intelligent Agents). The system acts with two processes: the first one is an information tracking on the device performance and the second one is a wireless network traffic monitoring, analyzing both the traffic of monitored devices. As proof of concepts a prototype was developed and some experiments were carried to validate this solution.
Os dispositivos móveis são uma realidade cada vez mais comum em redes wireless e se integraram ao ambiente wireless, contribuindo para facilidade e disponibilidade da informação. Entretanto, o ambiente wireless está sujeito a vulnerabilidades, devido à forma de propagação da informação que se dá através do ar, estando sujeito a intercepção ou até mesmo roubo das informações. Dispositivos móveis além de estarem sujeitos a essas vulnerabilidades comuns em ambientes wireless, são dispositivos com algumas limitações físicas, como pouca capacidade de processamento e memória, além da vida útil de bateria limitada. Estas limitações tornam-se críticas neste tipo ambiente, quando ameaças não identificadas são direcionadas a dispositivos móveis. Torna-se necessário a implementação de sistema de detecção de intrusão voltado para estes dispositivos a fim de identificar comportamentos intrusivos, levando em consideração suas limitações físicas. Este trabalho propõe um sistema de detecção de intrusão (IDS, Intrusion Detection System) em redes wireless destinados a dispositivos móveis como adaptação e extensão do IDS-NIDIA (Intrusion Detection System- Network Intrusion Detection System based on Intelligent Agents). O mecanismo utiliza dois processos: o primeiro faz o monitoramento de informações sobre o comportamento do dispositivo e o segundo através do monitoramento de tráfego da rede wireless, analisando o tráfego destinado e originado aos dispositivos monitorados. A implementação da arquitetura e os testes realizados demonstram a viabilidade da solução.
MORAES, Falkner de Área Leão. "SEGURANÇA E CONFIABILIDADE EM IDS BASEADOS EM AGENTES." Universidade Federal do Maranhão, 2009. http://tedebc.ufma.br:8080/jspui/handle/tede/1843.
Full textMade available in DSpace on 2017-08-21T12:14:23Z (GMT). No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5) Previous issue date: 2009-02-16
Lack of security is a constant concern in open distributed systems. Threats are present within environments insecure, uncertain and constantly changing. Due to this problem, many tools for evaluating vulnerabilities of the network as well as for their protection are being developed as techniques for encryption and software systems such as antivirus, firewall and IDS (Intrusion Detection System). Among these, there are IDS systems that are being conceived, designed and implemented, using techniques executed by agents. However, it is necessary to assure security and reliability of exchanged messages inside IDS. For this purpose, this paper proposes a security solution for IDS based on agents. The proposed solution provides a methodology and a secure mechanism for communication among agents, through information protection configuration mechanisms, authentication and authorization, key control and messages persistence using XML. The proposed solution is implemented as an extension to the IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), whose architecture has an intelligent agent society that communicate in a cooperative way in a distributed environment. The implementation of the prototype and tests proposed in this work show the applicability of the proposed solution.
A falta de segurança é uma preocupação constante em sistemas distribuídos abertos. Ameaças estão presentes dentro de ambientes inseguros, incertos e que mudam constantemente. Devido a esses problemas, diversas ferramentas para avaliação de vulnerabilidades da rede, bem como para sua proteção, estão sendo desenvolvidas como técnicas de criptografia e softwares como antivírus, firewall e IDS (Intrusion Detection System). Dentre estas, destaca-se Sistemas IDS que estão crescentemente sendo concebidos, projetados e implementados, usando técnicas de segurança executadas por agentes. Entretanto, é necessário que a segurança e a confiabilidade das mensagens trocadas dentro de um sistema IDS sejam asseguradas. Para este fim, este trabalho propõe uma solução segura e confiável para IDS baseada em agentes. A solução propõe estabelecer um esquema de execução e comunicação segura dos agentes através de mecanismos de proteção de informações de configuração, autenticação e autorização, controle de chaves e persistência de mensagens do IDS, utilizando XML. A solução proposta é implementada como uma extensão do IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), cuja arquitetura consiste em uma sociedade de agentes inteligentes que se comunicam de forma cooperativa em um ambiente distribuído. A implementação do protótipo e os testes apresentados neste trabalho demonstram a aplicabilidade da solução proposta.
Books on the topic "IDS"
Hodel, Rudy. Ids Willemsma. Wezep: Uitgeverij De Kunst, 2012.
Find full textReview, IDS Management pay, ed. IDS management pay review. London: Incomes Data Services Ltd, 2002.
Find full textTomaić, Tatjana. IDS - /ne/uspjeh istarskog regionalizma: Istarski regionalizam, politika identiteta IDS-a 1990-2003. Zagreb: Despot infinitus d.o.o., 2018.
Find full textServices, Incomes Data, ed. IDS pensions service: Personnel manual. London: Incomes Data Services, 1987.
Find full textNg'ethe, Njuguna. Development studies and the IDS. Nairobi: Institute for Development Studies, University of Nairobi, 2002.
Find full textNutrition, Nestle. Lip ids in modern nutrition. Vevey: Nestle Nutrition, 1988.
Find full textServices, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.
Find full textServices, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.
Find full textServices, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.
Find full textServices, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.
Find full textBook chapters on the topic "IDS"
Carthern, Chris, William Wilson, Richard Bedwell, and Noel Rivera. "ASA and IDS." In Cisco Networks, 715–57. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0859-5_21.
Full textWallace, Mark. "Motivation for IDS." In Building Decision Support Systems, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41732-1_1.
Full textShaw, D. John. "Work at IDS." In Sir Hans Singer, 155–57. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1057/9781403932860_16.
Full textLange, Christoph, Jörg Langkau, and Sebastian Bader. "The IDS Information Model: A Semantic Vocabulary for Sovereign Data Exchange." In Designing Data Spaces, 111–27. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_7.
Full textBurkart, Nadia, Maximilian Franz, and Marco F. Huber. "Explanation Framework for Intrusion Detection." In Machine Learning for Cyber Physical Systems, 83–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.
Full textHerrero, Álvaro, and Emilio Corchado. "A Novel Hybrid IDS." In Mobile Hybrid Intrusion Detection, 71–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18299-0_4.
Full textTennison, Jeni. "IDs, Keys, and Groups." In Beginning XSLT, 360–93. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-5368-6_11.
Full textMartini, Germ. "Infrared Detection Systems (IDS)." In Drowning, 1167–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-04253-9_183.
Full textKirovski, Darko, Nebojša Jojić, and Gavin Jancke. "Tamper-Resistant Biometric IDs." In ISSE 2004 — Securing Electronic Business Processes, 160–75. Wiesbaden: Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84984-7_17.
Full textSale, Gregory, Rebecca Jackson, Luis Garcia, and Jacquelyn McCroskey. "Future IDs at Alcatraz." In Using Art for Social Transformation, 69–82. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003105350-6.
Full textConference papers on the topic "IDS"
Gupta, Payas, Chedy Raïssi, Gerard Dray, Pascal Poncelet, and Johan Brissaud. "SS-IDS: Statistical Signature Based IDS." In 2009 Fourth International Conference on Internet and Web Applications and Services. IEEE, 2009. http://dx.doi.org/10.1109/iciw.2009.67.
Full textOnashoga, Adebukola, Adebayo Akinde, and Adesina Sodiya. "A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3372.
Full textAmine, Daoud Mohamed, Dahmani Youcef, and Mostefaoui Kadda. "IDS-DL." In the 12th International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3357613.3357626.
Full textYan, Wenqing, Sam Hylamia, Thiemo Voigt, and Christian Rohner. "PHY-IDS." In MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3396870.3400010.
Full textSheykhkanloo, Naghmeh Moradpoor. "SQL-IDS." In SIN '15: The 8th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2799979.2800011.
Full textKemalis, Konstantinos, and Theodores Tzouramanis. "SQL-IDS." In the 2008 ACM symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1363686.1364201.
Full text"Committee Members IDS 2021 BigDataSecurity/HPSC/IDS 2021." In 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2021. http://dx.doi.org/10.1109/bigdatasecurityhpscids52275.2021.00011.
Full textMadwanna, Yash, Annappa B., Rashmi Adyapady R., and Sneha H. R. "YARS-IDS: A Novel IDS for Multi-Class Classification." In 2023 IEEE 8th International Conference for Convergence in Technology (I2CT). IEEE, 2023. http://dx.doi.org/10.1109/i2ct57861.2023.10126301.
Full textSaheed, Y. K., R. D. Magaji, A. Tosho, and O. B. Longe,. "Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.
Full textZaman, Safaa, and Fakhri Karray. "Lightweight IDS Based on Features Selection and IDS Classification Scheme." In 2009 International Conference on Computational Science and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cse.2009.180.
Full textReports on the topic "IDS"
UK, Institute of Development Studies. IDS Annual Review 2021–22. Institute of Development Studies, September 2022. http://dx.doi.org/10.19088/ids.2022.054.
Full textBerg, J. S. Beam Loading Computation for the IDS-NF FFAG. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1034063.
Full textBerg, J. S. Initial Configuration of Acceleration for the IDS-NF Neutrino Factory. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1034062.
Full textSamuel, E. A., K. R. Murphy, and A. Demian. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/10106444.
Full textSamuel, E. A., K. R. Murphy, and A. Demian. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6146196.
Full textSkormin, Victor A. High Order Non-Stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (IDS). Fort Belvoir, VA: Defense Technical Information Center, February 2007. http://dx.doi.org/10.21236/ada464796.
Full textSantoro, Fabrizio, Laura Munoz, Wilson Prichard, and Giulia Mascagi. Digital Financial Services and Digital IDs: What Potential do They Have for Better Taxation in Africa? Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/ictd.2022.003.
Full textReyes, Angela, Benjamin Roseth, and Diego A. Vera-Cossio. Research Insights: How Digital Tools Increase Access to Government Services and Social Programs through On-time Renewals of IDs. Inter-American Development Bank, August 2021. http://dx.doi.org/10.18235/0003572.
Full textWickenden, Mary, Brigitte Rohwerder, and Stephen Thompson. IDS Action Learning Groups with Jobseekers and Employers Involved in the Inclusion Works Programme. A Report on the Process and Findings. Institute of Development Studies, June 2022. http://dx.doi.org/10.19088/ids.2022.047.
Full textFarhi, Emmanuel, and Matteo Maggiori. China vs. U.S.: IMS Meets IPS. Cambridge, MA: National Bureau of Economic Research, January 2019. http://dx.doi.org/10.3386/w25469.
Full text