Academic literature on the topic 'IDS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IDS"

1

Ho, Catherine C., and Daniel J. Bernard. "Bone Morphogenetic Protein 2 Acts via Inhibitor of DNA Binding Proteins to Synergistically Regulate Follicle-Stimulating Hormone β Transcription with Activin A." Endocrinology 151, no. 7 (May 12, 2010): 3445–53. http://dx.doi.org/10.1210/en.2010-0071.

Full text
Abstract:
We recently reported that bone morphogenetic proteins (BMPs) 2 and 4 can stimulate FSHβ-subunit (Fshb) transcription alone and in synergy with activins. We further showed that BMP2 signals via the BMP type IA receptor (or activin receptor-like kinase 3) to mediate its effects. However, the intracellular mechanisms through which BMP2 regulates Fshb are unknown. In the current study, we used cDNA microarray analyses (and validation by real-time quantitative RT-PCR) to identify BMP2 target genes in the murine gonadotrope cell line, LβT2. Short-interfering RNA-mediated knockdown, overexpression, and coimmunoprecipitation experiments were used to examine the potential functional roles of selected gene products. Quantitative RT-PCR analysis largely confirmed the results of the array analyses, and inhibitors of DNA binding 1, 2, and 3 (Id1, Id2, and Id3) were selected for functional analyses. Knockdown of endogenous Id2 or Id3, but not Id1, diminished the synergistic effects of BMP2 and activin A on Fshb transcription. Overexpression of Id1, Id2, or Id3 alone had no effect, but all three potentiated activin A or mothers against decapentaplegic homolog (SMAD)3 induction of Fshb transcription. Though the precise mechanism through which Ids produce their effects are not yet known, we observed physical interactions between Id1, Id2, or Id3 and SMAD3. Collectively, the data suggest that BMP2 synergistically regulates Fshb transcription with activins, at least in part, through the combined actions of Ids 2 or 3 and SMAD3.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Suman. "IDS with Hybrid ID3 Algorithm." International Journal of Computer Applications 64, no. 17 (February 15, 2013): 12–15. http://dx.doi.org/10.5120/10725-5656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Xiao-Ming, Cheng-Ye Ji, Wen-Jing Liu, Zhu Long, and Xiao-Yi Shen. "Levels of serum transferrin receptor and its response to Fe-supplement in Fe-deficient children." British Journal of Nutrition 96, no. 6 (December 2006): 1134–39. http://dx.doi.org/10.1017/bjn20061954.

Full text
Abstract:
The object of the present study was to investigate the levels of serum transferrin receptor (sTfR) and its response to Fe supplementation in Fe-deficient children and the role of sTfR in detecting Fe deficiency and assessing the efficacy of Fe supplementation. According to the diagnostic standard, 1006 children, aged 6–14 years in Fangshan district, Beijing, Peoples Republic of China, were divided into four groups: normal; Fe store depletion (IDs); Fe deficiency erythropoiesis (IDE); Fe deficiency anaemia (IDA). sTfR was determined and transferrin receptor-ferritin (TfR-F) index was calculated in 238 children, sixty-four normal and 174 Fe deficient. Children were administered a NaFeEDTA capsule containing 60 mg Fe once per week for the IDs and IDE groups and three times per week for the IDA group for nine consecutive weeks. The parameters reflecting Fe status and sTfR were determined before and after Fe supplementation. The levels of sTfR and TfR-F index in Fe-deficient children were significantly higher than those in the normal group. The receiver operating characteristic curve showed that sTfR has proper diagnostic efficacy for functional Fe deficiency. After Fe supplementation, the level of sTfR was significantly decreased in children with IDs, but not in children with IDE and IDA, while TfR-F index was significantly decreased in Fe-deficient children. sTfR is a reliable indicator for detecting functional Fe deficiency, and TfR-F index is a sensitive parameter for assessing the efficacy of Fe supplementation.
APA, Harvard, Vancouver, ISO, and other styles
4

Shen, Shigen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han, and Qiying Cao. "Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/179839.

Full text
Abstract:
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor nodes due to their limited resources. For this aim, we obtain optimal strategies to save IDS agents’ power, through Quantal Response Equilibrium (QRE) that is more realistic than Nash Equilibrium. A stage Intrusion Detection Game (IDG) is formulated to describe interactions between the Attacker and IDS agents. The preference structures of different strategy profiles are analyzed. Upon these structures, the payoff matrix is obtained. As the Attacker and IDS agents interact continually, the stage IDG is extended to a repeated IDG and its payoffs are correspondingly defined. The optimal strategies based on QRE are then obtained. These optimal strategies considering bounded rationality make IDS agents not always be inDefend. Sensor nodes’ power consumed in performing intrusion analyses can thus be saved. Experiment results show that the probabilities of the actions adopted by the Attacker can be predicted and thus the IDS can respond correspondingly to protect WSNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Cortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine, and Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models." Journal of Healthcare Engineering 2018 (October 14, 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.

Full text
Abstract:
Catheter-associated urinary tract infections (CAUTIs) are one of the most common nosocomial infections and can lead to numerous medical complications from the mild catheter encrustation and bladder stones to the severe septicaemia, endotoxic shock, and pyelonephritis. Catheters are one of the most commonly used medical devices in the world and can be characterised as either indwelling (ID) or intermittent catheters (IC). The primary challenges in the use of IDs are biofilm formation and encrustation. ICs are increasingly seen as a solution to the complications caused by IDs as ICs pose no risk of biofilm formation due to their short time in the body and a lower risk of bladder stone formation. Research on IDs has focused on the use of antimicrobial and antibiofilm compounds, while research on ICs has focused on preventing bacteria entering the urinary tract or coming into contact with the catheter. There is an urgent need for in vitro urinary tract models to facilitate faster research and development for CAUTI prevention. There are currently three urinary tract models that test IDs; however, there is only a single very limited model for testing ICs. There is currently no standardised urinary tract model to test the efficacies of ICs.
APA, Harvard, Vancouver, ISO, and other styles
6

Kanakogi, Kenta, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, and Nobukazu Yoshioka. "Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques." Information 12, no. 8 (July 26, 2021): 298. http://dx.doi.org/10.3390/info12080298.

Full text
Abstract:
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of common attributes and approaches employed by adversaries to exploit known weaknesses. Due to the fact that the information in these two repositories are not linked, identifying related CAPEC attack information from CVE vulnerability information is challenging. Currently, the related CAPEC-ID can be traced from the CVE-ID using Common Weakness Enumeration (CWE) in some but not all cases. Here, we propose a method to automatically trace the related CAPEC-IDs from CVE-ID using three similarity measures: TF–IDF, Universal Sentence Encoder (USE), and Sentence-BERT (SBERT). We prepared and used 58 CVE-IDs as test input data. Then, we tested whether we could trace CAPEC-IDs related to each of the 58 CVE-IDs. Additionally, we experimentally confirm that TF–IDF is the best similarity measure, as it traced 48 of the 58 CVE-IDs to the related CAPEC-ID.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Quan, Ye-Dong Mei, Huai-Jie Yang, and Ya-Ling Tao. "Inhibitor of DNA-binding family regulates the prognosis of ovarian cancer." Future Oncology 17, no. 15 (May 2021): 1889–906. http://dx.doi.org/10.2217/fon-2020-1006.

Full text
Abstract:
Aim: The mechanistic role of inhibitor of DNA binding or differentiation (ID) family in ovarian cancer (OC) has remained unclear. Materials & methods: We used the Oncomine, GEPIA, Kaplan–Meier Plotter, cBioPortal, SurvExpress, PROGgene V2, TIMER, and FunRich to evaluate the prognostic value of IDs in patients with OC. Results: the mRNA transcripts of all IDs were markedly downregulated in OC compared with normal tissue. The prognostic value of IDs was also explored within the subtypes, pathological stages, clinical stages and TP53 mutational status. The group with low-risk IDs showed relatively good overall survival (OS) compared with the high-risk group. Conclusion: ID1/3/4 may be exploited as promising prognostic biomarkers and therapeutic targets in OC patients.
APA, Harvard, Vancouver, ISO, and other styles
8

White, Arisa. "Fake IDs." Ecotone 14, no. 1 (2019): 104–12. http://dx.doi.org/10.1353/ect.2019.0025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peters, Barry. "IDS News." Institute of Development Studies Bulletin 3, no. 1 (May 22, 2009): 37–44. http://dx.doi.org/10.1111/j.1759-5436.1970.mp3001007.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peters, Barry. "IDS NEWS." Institute of Development Studies Bulletin 3, no. 3 (May 22, 2009): 56–62. http://dx.doi.org/10.1111/j.1759-5436.1971.mp3003010.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IDS"

1

Monzer, Mohamad-Houssein. "Model-based IDS design pour ICS." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT056.

Full text
Abstract:
Les systèmes industriels présentent des risques de sécurité liés à leurs vulnérabilités informatiques. Ces systèmes, répartis dans le monde, continuent d'être la cible d'attaques. Bien que les systèmes industriels partagent des vulnérabilités communes avec les systèmes informatiques, ils ont tendance à avoir plus de contraintes en raison de l'interaction entre les systèmes cyber et physiques.Les systèmes de détection d'intrusion donnent une visibilité au système et sont considérés comme l'une des solutions pour détecter les attaques ciblées. Il semble donc pertinent de s'appuyer sur un modèle physique du système cyber-physique pour obtenir un système de détection d'intrusion (IDS) pour les systèmes industriels. La plupart des IDS sont basés sur des règles qui définissent comment les attaques possibles sont détectées. Ces règles sont généralement utilisées pour décrire les scénarios d'attaque possibles sur les systèmes ou pour décrire le comportement normal du système. Cependant, la création et la maintenance manuels des règles pour un système complexe peuvent s'avérer être une tâche très difficile.Cette thèse propose une solution pour modéliser ICS et concevoir des IDS spécifiques pour les systèmes industriels. Un générateur de règles IDS basé sur un modèle est encore proposé, qui convertit un modèle de système en règles IDS basées sur des anomalies. Enfin, l'efficacité des règles générées est évaluée
Industrial systems present security risks related to their IT vulnerabilities. These systems, spread over the world, continue to be targets of attacks. While Industrial systems share common vulnerabilities with IT systems, they tend to have more constraints due to the interaction between cyber and physical systems.Intrusion detection systems give visibility to the system and are considered as one of the solutions to detect targeting attacks. Hence, it seems relevant to rely on a physical model of the cyber-physical system to obtain an intrusion detection system (IDS) for industrial systems. Most IDSs are based on rules that define how possible attacks are detected. These rules are generally used to either describe possible attack scenarios on the systems or used to describe the normal system behavior of the system. However, manually creating and maintaining rules for a complex system can prove to be a very tedious and difficult task.This thesis proposes a solution to model ICS and to design specific IDS for industrial systems. A model-based IDS rule generator is also proposed, which converts a system model into anomaly-based IDS rules. Finally, the effectiveness of the generated rules is evaluated
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandez, Maria del Mar, and Ignacio Porres. "An Evaluation of current IDS." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11635.

Full text
Abstract:

With the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.

APA, Harvard, Vancouver, ISO, and other styles
3

Alevizon, John V. "Odds and Ids : a novel." Virtual Press, 1988. http://liblink.bsu.edu/uhtbin/catkey/539859.

Full text
Abstract:
Odds and Ids is a satirical novel of 419 pages that ridicules the tenets of psychotherapy and the beliefs and behaviors of psychotherapists. There are two story lines which overlap and converge at the end. Odd chapters tell the story of semi-sane Clinical Psychologist Nicholas K. Mavros and his alcoholic dog, Misty, the melancholy collie. Disillusioned by life, and in particular by the sham of psychotherapy, Nick decides to commit suicide in seven days by driving his burgundy van off the Billy Bopplemeyer Pier at sunset.He and Misty form a sacred pact to achieve that gallant end. Knowing that he will be dead in one week frees Nick at work and play to say what he is thinking and to act as he is feeling. He simply does not care any longer what others--friends, staff, and clients--think of his behavior. The odd chapters follow him day by day until he and Misty plunge or do not plunge into the cold waters of Puget Sound.The even chapters trace the rise and fall of the fictional Rumanian Bithwanians, a strange family that personifies postFreudian psychotherapy. Three generations of odd Bithwanians bungle through the bizarre world of mental health, seldom knowing the first thing about how to help another human being. Each Bithwanian is so enmeshed in the intricacies of his own theory that he's;fails to see his clients as animate human beings.The last Bithwanian, whose suicide opens the second friend of Nicholas Mavros, the errant protagonist, whose intent to commit suicide 3efines the central plot of the odd chapters.Their relationship, seen in retrospect, ties the two story lines together.The guiding idea throughout the novel is that the right to label others, and this alone, separates therapists and clients.The following are shot at in the novel: A) Therapists and their illusions.B) Clients and their unrealistic expectations.C) The non-training of future clinicians.D) Therapy, insurance companies, the union of psychologists,sex, love, religion, tradition, and existentialism.
Department of English
APA, Harvard, Vancouver, ISO, and other styles
4

Šišmiš, Lukáš. "Optimalizace IDS/IPS systému Suricata." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445503.

Full text
Abstract:
V dnešnom svete zrýchľujúcej sa sieťovej prevádzky je potrebné držať krok v jej monitorovaní . Dostatočný prehľad o dianí v sieti dokáže zabrániť rozličným útokom na ciele nachádzajúce sa v nej . S tým nám pomáhajú systémy IDS, ktoré upozorňujú na udalosti nájdené v analyzovanej prevádzke . Pre túto prácu bol vybraný systém Suricata . Cieľom práce je vyladiť nastavenia systému Suricata s rozhraním AF_PACKET pre optimálnu výkonnosť a následne navrhnúť a implementovať optimalizáciu Suricaty . Výsledky z meraní AF_PACKET majú slúžiť ako základ pre porovnanie s navrhnutým vylepšením . Navrhovaná optimalizácia implementuje nové rozhranie založené na projekte Data Plane Development Kit ( DPDK ). DPDK je schopné akcelerovať príjem paketov a preto sa predpokladá , že zvýši výkon Suricaty . Zhodnotenie výsledkov a porovnanie rozhraní AF_PACKET a DPDK je možné nájsť na konci diplomovej práce .
APA, Harvard, Vancouver, ISO, and other styles
5

Zika, Ondřej. "Analýza IDS Prahy a Bratislavy." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162145.

Full text
Abstract:
The aim of this thesis is the analysis of integrated transport systems in Prague (Prague integrated transport) and in Bratislava (Bratislava integrated transport). The analysis identifies e. g. means of transport in these integrated transport systems, transport and legal relations, practical knowledge from travelling etc. In the conclusion of this theses there are suggested some recommendations in order to improve the system. This analysis showed that the creation of high-quality transport system is quite difficult.
APA, Harvard, Vancouver, ISO, and other styles
6

Johansson, Fredrik, Jörgen Johansson, and Marcus Johansson. "IDS för alla : Intrångsdetekteringssystem för hemmaanvändare." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23229.

Full text
Abstract:
I dagens IT-samhälle är säkerhet en viktig aspekt. Ett sätt att nå högre säkerhet är att bygga upp säkerheten i lager. I hemmanätverk är två vanliga lager antivirus och brandvägg. Den här kandidatuppsatsen undersöker om ett intrångsdetekteringsystem (IDS) är ett bra komplement till säkerheten i ett hemmanätverk.För att hålla systemet så attraktivt som möjligt för hemmanätverket fokuserar man på att hålla priset nere och konfigurationen enkel. Vi valde enkorts-datorn (Raspberry Pi) med programvaran IPFire, som är open-source, där IDS:en Snort ingår och IPFire har ett enkelt gränssnitt för konfiguration.För att mäta hur effektivt systemet fungerar, mäts det hur många hot Snort upptäcker. Mätningar gjordes också för att undersöka om systemet orsakade prestandaförluster i hemmanätverket.Av resultaten drogs slutsatsen att systemet är ett bra komplement till säkerheten i ett hemmanätverk. Det gick inte att säkerställa någon prestandaförlust på nätverket förens vid en uppkoppling på 100 mbit och däröver.
APA, Harvard, Vancouver, ISO, and other styles
7

Tjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.

Full text
Abstract:
An Intrusion Detection System (IDS) is one of the major techniques for securing information systems and keeping pace with current and potential threats and vulnerabilities in computing systems. It is an indisputable fact that the art of detecting intrusions is still far from perfect, and IDSs tend to generate a large number of false IDS alarms. Hence human has to inevitably validate those alarms before any action can be taken. As IT infrastructure become larger and more complicated, the number of alarms that need to be reviewed can escalate rapidly, making this task very difficult to manage. The need for an automated correlation and reduction system is therefore very much evident. In addition, alarm correlation is valuable in providing the operators with a more condensed view of potential security issues within the network infrastructure. The thesis embraces a comprehensive evaluation of the problem of false alarms and a proposal for an automated alarm correlation system. A critical analysis of existing alarm correlation systems is presented along with a description of the need for an enhanced correlation system. The study concludes that whilst a large number of works had been carried out in improving correlation techniques, none of them were perfect. They either required an extensive level of domain knowledge from the human experts to effectively run the system or were unable to provide high level information of the false alerts for future tuning. The overall objective of the research has therefore been to establish an alarm correlation framework and system which enables the administrator to effectively group alerts from the same attack instance and subsequently reduce the volume of false alarms without the need of domain knowledge. The achievement of this aim has comprised the proposal of an attribute-based approach, which is used as a foundation to systematically develop an unsupervised-based two-stage correlation technique. From this formation, a novel SOM K-Means Alarm Reduction Tool (SMART) architecture has been modelled as the framework from which time and attribute-based aggregation technique is offered. The thesis describes the design and features of the proposed architecture, focusing upon the key components forming the underlying architecture, the alert attributes and the way they are processed and applied to correlate alerts. The architecture is strengthened by the development of a statistical tool, which offers a mean to perform results or alert analysis and comparison. The main concepts of the novel architecture are validated through the implementation of a prototype system. A series of experiments were conducted to assess the effectiveness of SMART in reducing false alarms. This aimed to prove the viability of implementing the system in a practical environment and that the study has provided appropriate contribution to knowledge in this field.
APA, Harvard, Vancouver, ISO, and other styles
8

Aspernäs, Andreas, and Thommy Simonsson. "IDS on Raspberry Pi : A Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43997.

Full text
Abstract:
This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to  handle network traffic while acting as an intrusion detection system. To examine this a testing environment was set up containing two workstation computers connected to a Raspberry Pi, each computer hosting a virtual machine. Tests measuring the network throughput as well as the CPU and memory usage were performed on each of the Raspberry Pi devices. Two models of Raspberry Pis were used; Raspberry Pi model B+ and Raspberry Pi 2 model B; each of them running the operating system Arch Linux ARM. The results of these tests were that both of the Raspberry Pis could be used as an intrusion detection system but has some limitations that could impede usage depending on the requirements of the user. Raspberry Pi 2 model B show benefits of its updated hardware by suffering lower throughput degradation than Raspberry Pi model B+, while using less of it's total CPU and memory capacity.
Den här rapporten behandlar möjligheten att använda en Raspberry Pi som ett intrångdetekteringssystem i en hemma miljö för att öka nätverkssäkerheten. Fokusen i den här studien ligger på hur väl de två senaste generationerna av Raspberry Pi skulle kunna hantera nätverkstrafik samtidigt som den undersöker nätverkstrafiken och söker efter hot. För att kontrollera hur väl en Raspberry Pi kan fungera som ett intrångdetekteringssystem har en laborationsmiljö upprättats bestående av två fysiska maskiner som vardera används för att virtualisera en virtuell maskin. Tester för att mäta datagenomströmning, processor och minnesbelastning utfördes på var och en av Raspberry Pi. Två modeller av Raspberry Pi användes; Raspberry Pi model b+ och Raspberry Pi 2 model b, både körde operativsystemet Arch Linux ARM. Resultatet av testerna visade att det går att använda båda enheterna för att upprätta ett intrångdetekteringssystem, men det finns vissa begränsningar i enheterna vilket kan begränsa implementationsmöjligheterna. Raspberry Pi 2 model B uppvisade bättre resultat i form av att den är lägre belastad och har en högre datagenomströmning till skillnad från Raspberry Pi model B+. Raspberry Pi 2 model B har nyare och snabbare hårdvara vilket är den troliga orsaken till att den presterar bättre.
APA, Harvard, Vancouver, ISO, and other styles
9

SILVA, Aline Lopes da. "MODELO DE IDS PARA USUÁRIOS DE DISPOSITIVOS MÓVEIS." Universidade Federal do Maranhão, 2008. http://tedebc.ufma.br:8080/jspui/handle/tede/335.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:52:48Z (GMT). No. of bitstreams: 1 Aline lopes.pdf: 2261944 bytes, checksum: 0cbbb27a7a17ab362f4fce42298c4b45 (MD5) Previous issue date: 2008-06-26
Mobile devices are increasing common reality in wireless networks and have integrated the wireless environment, helping to ease and to make available information. Meanwhile, the wireless environment is subject to vulnerabilities because of the way of spreading information that is given through the air, and is subject to interception or even information theft. Mobile Devices in addition of its vulnerability to these vulnerabilities common in wireless environments, are devices with some physical limitations such as lack of processing capacity and memory, beyond the limited battery life. These limitations become critical in this kind of environment, when unidentified threats attack are directed mobile devices. It is necessary to develop an intrusion detection system dedicated to these devices to identify intrusive behaviour, taking into account their physical limitations. This work proposes an intrusion detection system (IDS, Intrusion Detection System) for wireless networks and mobile devices. This is an adaptation and extension of NIDIA-IDS (Intrusion Detection System-Network Intrusion Detection System based on Intelligent Agents). The system acts with two processes: the first one is an information tracking on the device performance and the second one is a wireless network traffic monitoring, analyzing both the traffic of monitored devices. As proof of concepts a prototype was developed and some experiments were carried to validate this solution.
Os dispositivos móveis são uma realidade cada vez mais comum em redes wireless e se integraram ao ambiente wireless, contribuindo para facilidade e disponibilidade da informação. Entretanto, o ambiente wireless está sujeito a vulnerabilidades, devido à forma de propagação da informação que se dá através do ar, estando sujeito a intercepção ou até mesmo roubo das informações. Dispositivos móveis além de estarem sujeitos a essas vulnerabilidades comuns em ambientes wireless, são dispositivos com algumas limitações físicas, como pouca capacidade de processamento e memória, além da vida útil de bateria limitada. Estas limitações tornam-se críticas neste tipo ambiente, quando ameaças não identificadas são direcionadas a dispositivos móveis. Torna-se necessário a implementação de sistema de detecção de intrusão voltado para estes dispositivos a fim de identificar comportamentos intrusivos, levando em consideração suas limitações físicas. Este trabalho propõe um sistema de detecção de intrusão (IDS, Intrusion Detection System) em redes wireless destinados a dispositivos móveis como adaptação e extensão do IDS-NIDIA (Intrusion Detection System- Network Intrusion Detection System based on Intelligent Agents). O mecanismo utiliza dois processos: o primeiro faz o monitoramento de informações sobre o comportamento do dispositivo e o segundo através do monitoramento de tráfego da rede wireless, analisando o tráfego destinado e originado aos dispositivos monitorados. A implementação da arquitetura e os testes realizados demonstram a viabilidade da solução.
APA, Harvard, Vancouver, ISO, and other styles
10

MORAES, Falkner de Área Leão. "SEGURANÇA E CONFIABILIDADE EM IDS BASEADOS EM AGENTES." Universidade Federal do Maranhão, 2009. http://tedebc.ufma.br:8080/jspui/handle/tede/1843.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-21T12:14:23Z No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5)
Made available in DSpace on 2017-08-21T12:14:23Z (GMT). No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5) Previous issue date: 2009-02-16
Lack of security is a constant concern in open distributed systems. Threats are present within environments insecure, uncertain and constantly changing. Due to this problem, many tools for evaluating vulnerabilities of the network as well as for their protection are being developed as techniques for encryption and software systems such as antivirus, firewall and IDS (Intrusion Detection System). Among these, there are IDS systems that are being conceived, designed and implemented, using techniques executed by agents. However, it is necessary to assure security and reliability of exchanged messages inside IDS. For this purpose, this paper proposes a security solution for IDS based on agents. The proposed solution provides a methodology and a secure mechanism for communication among agents, through information protection configuration mechanisms, authentication and authorization, key control and messages persistence using XML. The proposed solution is implemented as an extension to the IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), whose architecture has an intelligent agent society that communicate in a cooperative way in a distributed environment. The implementation of the prototype and tests proposed in this work show the applicability of the proposed solution.
A falta de segurança é uma preocupação constante em sistemas distribuídos abertos. Ameaças estão presentes dentro de ambientes inseguros, incertos e que mudam constantemente. Devido a esses problemas, diversas ferramentas para avaliação de vulnerabilidades da rede, bem como para sua proteção, estão sendo desenvolvidas como técnicas de criptografia e softwares como antivírus, firewall e IDS (Intrusion Detection System). Dentre estas, destaca-se Sistemas IDS que estão crescentemente sendo concebidos, projetados e implementados, usando técnicas de segurança executadas por agentes. Entretanto, é necessário que a segurança e a confiabilidade das mensagens trocadas dentro de um sistema IDS sejam asseguradas. Para este fim, este trabalho propõe uma solução segura e confiável para IDS baseada em agentes. A solução propõe estabelecer um esquema de execução e comunicação segura dos agentes através de mecanismos de proteção de informações de configuração, autenticação e autorização, controle de chaves e persistência de mensagens do IDS, utilizando XML. A solução proposta é implementada como uma extensão do IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), cuja arquitetura consiste em uma sociedade de agentes inteligentes que se comunicam de forma cooperativa em um ambiente distribuído. A implementação do protótipo e os testes apresentados neste trabalho demonstram a aplicabilidade da solução proposta.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IDS"

1

Hodel, Rudy. Ids Willemsma. Wezep: Uitgeverij De Kunst, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Review, IDS Management pay, ed. IDS management pay review. London: Incomes Data Services Ltd, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tomaić, Tatjana. IDS - /ne/uspjeh istarskog regionalizma: Istarski regionalizam, politika identiteta IDS-a 1990-2003. Zagreb: Despot infinitus d.o.o., 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Services, Incomes Data, ed. IDS pensions service: Personnel manual. London: Incomes Data Services, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ng'ethe, Njuguna. Development studies and the IDS. Nairobi: Institute for Development Studies, University of Nairobi, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nutrition, Nestle. Lip ids in modern nutrition. Vevey: Nestle Nutrition, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Services, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Services, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Services, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Services, Incomes Data, ed. IDS brief: Employment law and practice. London: Incomes Data Services, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IDS"

1

Carthern, Chris, William Wilson, Richard Bedwell, and Noel Rivera. "ASA and IDS." In Cisco Networks, 715–57. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0859-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wallace, Mark. "Motivation for IDS." In Building Decision Support Systems, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41732-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shaw, D. John. "Work at IDS." In Sir Hans Singer, 155–57. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1057/9781403932860_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lange, Christoph, Jörg Langkau, and Sebastian Bader. "The IDS Information Model: A Semantic Vocabulary for Sovereign Data Exchange." In Designing Data Spaces, 111–27. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_7.

Full text
Abstract:
AbstractThe Information Model of the International Data Spaces (IDS-IM) is the central integration enabler for the semantic interoperability in any IDS ecosystem. It contains the terms and relationships to describe the IDS components, their interactions, and conditions under which data exchange and usage is possible. It thus presents the common denominator for the IDS and the foundation for any IDS communication. As such, its evolution cycles are deeply related with the maturity process of the IDS itself. This chapter makes the following contributions related to the IDS Information Model: a brief overview of the vocabulary, its guiding principles, and general features is supplied. Based on these explanations, several upcoming aspects are discussed that reflect the latest state of discussions about the declaration and cryptographic assurance of identities and decentralized identifiers, and how these need to be treated to ensure compliance with the IDS principles.In addition, we explain the latest developments around the IDS Usage Contract Language, the module of the IDS-IM that expresses Usage Contracts, and data restrictions. These definitions are further implemented with infrastructure components, in particular the presented, newly specified Policy Information Point and the Participant Information Service of the IDS.
APA, Harvard, Vancouver, ISO, and other styles
5

Burkart, Nadia, Maximilian Franz, and Marco F. Huber. "Explanation Framework for Intrusion Detection." In Machine Learning for Cyber Physical Systems, 83–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.

Full text
Abstract:
AbstractMachine learning and deep learning are widely used in various applications to assist or even replace human reasoning. For instance, a machine learning based intrusion detection system (IDS) monitors a network for malicious activity or specific policy violations. We propose that IDSs should attach a sufficiently understandable report to each alert to allow the operator to review them more efficiently. This work aims at complementing an IDS by means of a framework to create explanations. The explanations support the human operator in understanding alerts and reveal potential false positives. The focus lies on counterfactual instances and explanations based on locally faithful decision-boundaries.
APA, Harvard, Vancouver, ISO, and other styles
6

Herrero, Álvaro, and Emilio Corchado. "A Novel Hybrid IDS." In Mobile Hybrid Intrusion Detection, 71–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18299-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tennison, Jeni. "IDs, Keys, and Groups." In Beginning XSLT, 360–93. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-5368-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martini, Germ. "Infrared Detection Systems (IDS)." In Drowning, 1167–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-04253-9_183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kirovski, Darko, Nebojša Jojić, and Gavin Jancke. "Tamper-Resistant Biometric IDs." In ISSE 2004 — Securing Electronic Business Processes, 160–75. Wiesbaden: Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84984-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sale, Gregory, Rebecca Jackson, Luis Garcia, and Jacquelyn McCroskey. "Future IDs at Alcatraz." In Using Art for Social Transformation, 69–82. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003105350-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IDS"

1

Gupta, Payas, Chedy Raïssi, Gerard Dray, Pascal Poncelet, and Johan Brissaud. "SS-IDS: Statistical Signature Based IDS." In 2009 Fourth International Conference on Internet and Web Applications and Services. IEEE, 2009. http://dx.doi.org/10.1109/iciw.2009.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Onashoga, Adebukola, Adebayo Akinde, and Adesina Sodiya. "A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3372.

Full text
Abstract:
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode of data collection, the techniques for analysis, and the security of these intelligent codes. Their strengths and problems are stated wherever applicable. Furthermore, suggested ways of improving on current MA-IDS designs are presented in order to achieve an efficient mobile agent-based IDS for future security of distributed network.
APA, Harvard, Vancouver, ISO, and other styles
3

Amine, Daoud Mohamed, Dahmani Youcef, and Mostefaoui Kadda. "IDS-DL." In the 12th International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3357613.3357626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Wenqing, Sam Hylamia, Thiemo Voigt, and Christian Rohner. "PHY-IDS." In MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3396870.3400010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sheykhkanloo, Naghmeh Moradpoor. "SQL-IDS." In SIN '15: The 8th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2799979.2800011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kemalis, Konstantinos, and Theodores Tzouramanis. "SQL-IDS." In the 2008 ACM symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1363686.1364201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Committee Members IDS 2021 BigDataSecurity/HPSC/IDS 2021." In 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2021. http://dx.doi.org/10.1109/bigdatasecurityhpscids52275.2021.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Madwanna, Yash, Annappa B., Rashmi Adyapady R., and Sneha H. R. "YARS-IDS: A Novel IDS for Multi-Class Classification." In 2023 IEEE 8th International Conference for Convergence in Technology (I2CT). IEEE, 2023. http://dx.doi.org/10.1109/i2ct57861.2023.10126301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saheed, Y. K., R. D. Magaji, A. Tosho, and O. B. Longe,. "Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.

Full text
Abstract:
Intrusion Detection Systems (IDSs) are widely used in various computer networks with the goal of spotting cyber threats and potential incidents. Collaborative intrusion detection networks (CIDSs) have been developed to augment the detection power of a single IDS by allowing IDS nodes to exchange data. The Internet of Things (IoT) can be thought of as a network or connectivity of sensors and actuators that share data in a unique way. Blockchain technology has been applied in a variety of fields to foster trust and data protection by enabling participants to trade transactions and communicate information while preserving a level of trust, integrity, and greater transparency. However, there are numerous security concerns associated with the implementation architectures and technologies that will form the Internet of Things' backbone. Hence, this paper proposes a machine learning technique leveraging on blockchain technology with IDS for detecting attacks on IoT. In this paper, we used Naïve Bayes (NB), K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) models for performing the experiment on NSLKDD dataset. The experimental findings for KNN model achieved 99.6% detection rate with a false alarm rate of 0.4. The NB and SVM models also gave competitive results. Keywords: Machine Learning, Blockchain, Intrusion Detection System, Internet of Things, K-Nearest, Online Safety, Neighbor, Collaborative IDS
APA, Harvard, Vancouver, ISO, and other styles
10

Zaman, Safaa, and Fakhri Karray. "Lightweight IDS Based on Features Selection and IDS Classification Scheme." In 2009 International Conference on Computational Science and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cse.2009.180.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IDS"

1

UK, Institute of Development Studies. IDS Annual Review 2021–22. Institute of Development Studies, September 2022. http://dx.doi.org/10.19088/ids.2022.054.

Full text
Abstract:
It has been a year marked by conflict, climate change, and Covid-19 – intersecting crises that intensify and entrench longer-term vulnerabilities. As we highlight in the IDS 2021–22 Annual Review, these uncertain times demand that development research be done differently, with new approaches to learning and knowledge exchange that engage policy actors and diverse communities. Our work in the past year has centred on navigating uncertainties and crises, and despite the ongoing effects of Covid-19 and the challenge of major cuts to UK Government aid funding, IDS has made exciting progress. Read the 2021–22 Annual Review to find out more.
APA, Harvard, Vancouver, ISO, and other styles
2

Berg, J. S. Beam Loading Computation for the IDS-NF FFAG. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1034063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berg, J. S. Initial Configuration of Acceleration for the IDS-NF Neutrino Factory. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1034062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Samuel, E. A., K. R. Murphy, and A. Demian. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/10106444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samuel, E. A., K. R. Murphy, and A. Demian. A 12-MW-scale pilot study of in-duct scrubbing (IDS) using a rotary atomizer. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6146196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Skormin, Victor A. High Order Non-Stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (IDS). Fort Belvoir, VA: Defense Technical Information Center, February 2007. http://dx.doi.org/10.21236/ada464796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santoro, Fabrizio, Laura Munoz, Wilson Prichard, and Giulia Mascagi. Digital Financial Services and Digital IDs: What Potential do They Have for Better Taxation in Africa? Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/ictd.2022.003.

Full text
Abstract:
New digital technologies are now being widely used in Africa and lower-income countries (LICs). This has had an impact on tax administration, which has been increasingly digitised. Specifically Digital Financial Services (DFS) and digital IDs can improve tax administration. They have the potential to identify taxpayers more easily, communicate with them better, enforce and monitor compliance, and reduce compliance costs. While the potential is clear, existing literature indicates some of the barriers. Take-up of digital technology is still low due to barriers. Also, when taking up the technology, taxpayers often tend to adopt various measures to minimise tax payments. Within tax administrations there are challenges to accessibility and use of quality data. Mistakes can be made when launching digitisation, and there are regulatory and political barriers for effective use of digital technology. Given this context, this paper summarises key questions that are relevant for research and policy development to make more effective use of digital technology in tax administration in Africa and LICs.
APA, Harvard, Vancouver, ISO, and other styles
8

Reyes, Angela, Benjamin Roseth, and Diego A. Vera-Cossio. Research Insights: How Digital Tools Increase Access to Government Services and Social Programs through On-time Renewals of IDs. Inter-American Development Bank, August 2021. http://dx.doi.org/10.18235/0003572.

Full text
Abstract:
Sending SMS reminders increased the probability of on-time renewals of IDs by 12 percentage points, while also allowing citizens to renew their IDs online only increased renewals by 8 percentage points. Providing an online option (instead of in-person renewals) was less effective due to a poor user experience with the online procedure. The poorest individuals who received reminders were also more likely to receive transfers from an emergency in-kind transfer delivered through digital vouchers.
APA, Harvard, Vancouver, ISO, and other styles
9

Wickenden, Mary, Brigitte Rohwerder, and Stephen Thompson. IDS Action Learning Groups with Jobseekers and Employers Involved in the Inclusion Works Programme. A Report on the Process and Findings. Institute of Development Studies, June 2022. http://dx.doi.org/10.19088/ids.2022.047.

Full text
Abstract:
The report describes how IDS organised and ran a series of action learning groups with jobseekers and employers involved with the FCDO-funded Inclusion Works programme. Action learning groups are a participatory way of learning over time about the participants’ experiences of the programme and their wider perceptions of the world of work and moves towards more inclusive practice generally. The groups were held in the four programme countries: Bangladesh, Kenya, Nigeria and Uganda. The report includes key findings and reflections from the groups, the local facilitators and the IDS team.
APA, Harvard, Vancouver, ISO, and other styles
10

Farhi, Emmanuel, and Matteo Maggiori. China vs. U.S.: IMS Meets IPS. Cambridge, MA: National Bureau of Economic Research, January 2019. http://dx.doi.org/10.3386/w25469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography