Academic literature on the topic 'IDS IMPLEMENTATION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IDS IMPLEMENTATION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IDS IMPLEMENTATION"
Tarkhan, Mahdi, Saeed Bagheri Shouraki, and Seyed Hossein Khasteh. "A novel hardware implementation of IDS method." IEICE Electronics Express 6, no. 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Full textPaul, Morgan. "Looking to the Future." Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, no. 1 (September 8, 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.
Full textMizutani, Masayoshi, Shin Shirahata, Masaki Minami, and Jun Murai. "The design and implementation of session-based IDS." Electronics and Communications in Japan (Part I: Communications) 89, no. 3 (March 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.
Full textBush-Mecenas, Susan, Julie A. Marsh, and Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform." Teachers College Record: The Voice of Scholarship in Education 122, no. 10 (October 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.
Full textMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki, and Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method." IEEE Transactions on Fuzzy Systems 19, no. 6 (December 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Full textBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss, and Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Full textBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon, and David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies." Antibiotics 9, no. 12 (November 27, 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.
Full textMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (March 31, 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Full textKim, Song-Mok, and Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano." Journal of Digital Contents Society 24, no. 11 (November 30, 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Full textSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Full textDissertations / Theses on the topic "IDS IMPLEMENTATION"
Fors, Markus, and Christian Grahn. "An implementation of a DNS-based malware detection system." Thesis, Karlstad University, Karlstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6036.
Full textToday’s wide usage of the Internet makes malicious software (malware) and botnets a big problem. While anti-virus software is commonplace today, malware is constantly evolving to remain undetected. Passively monitoring DNS traffic on a network can present a platform for detecting malware on multiple computers at a low cost and low complexity. To explore this avenue for detecting malware we decided it was necessary to design an extensible system where the framework was separate from the actual detection methods. We wanted to divide the system into three parts, one for logging, one for handling modules for detection and one for taking action against suspect traffic. The system we implemented in C collects DNS traffic and processes it with modules that are compiled separately and can be plugged in or out during runtime. Two proof of concept modules have been implemented. One based on a blacklist and one based on geolocation of requested servers. The system is complete to the point of being ready for field testing and implementation of more advanced detection modules.
Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.
Full textNykvist, Carl, and Martin Larsson. "Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157481.
Full textFu, Yulong. "Sécurité Vérification d’implémentation de protocole." Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3003/document.
Full textRegarding the development of computer technologies, computer systems have been deeply used in our daily life. Those systems have become the foundation of our modern information society. Some of them even take responsibilities for many essential and sensitive tasks (e.g., Medical Treatment System, E-Commerce, Airplane System, Spaceship System, etc.). Once those systems are executed with problems, the loss on the economy may reach an unacceptable number. In order to avoid these disappointing situations, the security of the current systems needs to be verified before their installations. While, most of the systems are implemented from protocol specifications, the problems of verifying the security of concrete system can be transformed to verify the security of protocol implementation. In this thesis, we focus on the security verification methods of protocol implementations and we are interested with two main types of network attacks: Denis-of-Services (DoS) attacks and Protocol Authentication attacks. We investigate the features of these attacks and the existed formal verification methods and propose two extended models of IOLTS and the corresponding algorithms to generate the security verification test cases automatically. In order to avoid the possible state explosions, we also formalize the security experiences of the tester as Security Objective to control the test generation on-the-fly. Meanwhile, a modeled based Anomaly Intrusion Detection Systems (IDS) analysis method is also proposed in this thesis, which can enhance the detect abilities of Anomaly IDS. These proposed verification methods are demonstrated with the case study of RADIUS protocol and an integrated GUI tool is also proposed to simply the operations of test generation
Olsson, Jenny, Veronica Karlsson, and Maria Muravskaya. "Swedbank's implementation process of IFRS." Thesis, Jönköping University, JIBS, Business Administration, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-895.
Full textSammanfattning
Bakgrund: En ökad handel över nationsgränserna har skapat en efterfrågan på ett internationellt redovisningsspråk. IASB har därför skapat ett set med högkvalitativa internationella redovisningsstandarder. Från och med 2005 kräver EU att alla företag som är listade på en reglerad marknad inom EU ska an-vända sig av IASBs standarder IFRS.
Problem: Genomförandet av implementeringen av IFRS är olika i olika företag. Vi vill därför undersöka hur implementeringsprocessen var genomförd i Sveriges största bank, Swedbank.
Syfte: Syftet med den här rapporten är att beskriva samt förklara hur förändringen till IFRS genomfördes i Swedbank samt att beskriva de eventuella problem och hinder som implementeringen av dessa standarder kan ha medfört.
Metod: Vi har valt att göra en fallstudie genom att intervjua anställda i Swedbank som har varit delaktiga i implementeringsprocessen. Vi har också intervjuat Deloitte för att få deras syn på en implementeringsprocess av IFRS.
Analys: Vår analys är baserad på empirisk data i jämförelse med ett teoretiskt underlag. Vad vi har kommit fram till är att Swedbank har inkluderat de flesta av de steg som tas upp i teorin angående en implementering av IFRS; de har förberett sig bra samt använt rätt resurser. De har dock avvikit genom att inte utvärdera processen när den var klar.
Slutsats: Swedbank satte ihop en central projekt grupp som skötte implementering-en. De identifierade de ändringar som skulle göras och genomförde dessa. De problem som uppstod i processen har sitt ursprung i FVO och IAS 39.
Abstract
Background: An increase in cross-border trade has created a need for a common international accounting language. IASB therefore created a single set of high quality international accounting standards. As of 2005 all companies listed on a regulated market within the EU are mandated to use IASB’s standard IFRSs.
Problem: The process of implementing IFRS is different in different companies. We therefore want to look at the implementation process in Swedbank, the largest bank in Sweden.
Purpose: The purpose of this study is to describe and explain how the process of the change to IFRSs was done within Swedbank and to outline the problems and obstacles that might have occurred when implementing these new standards.
Method: We have done a case study by interviewing people in Swedbank that took part in the implementation process. We have also done an interview with Deloitte to get their views on a IFRSs implementation process.
Analysis: Our analysis is based on our empirical findings in comparison with our theoretical framework. We found that Swedbank did most of the steps described in the theoretical framework regarding the implementation process; they prepared themselves well and choose the right resources to do so. The deviating step is that no evaluation was done afterwards.
Conclusion: Swedbank used a project group to handle the implementation process. They identified the changes that had to be done and did the change to IFRS. The problems and obstacles that occurred were due to FVO and IAS 39.
Vidal, Sandoval Jesus Enrique. "Implicit IDA-PBC Design and Implementation for a Portal Crane System." Master's thesis, Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15353.
Full textInterconnection and damping assignment passivity-based control (IDA-PBC) ist eine wohlbekannte Methode zur Regelung von nichtlinearen Systemen, die im geschlossenen Regelkreis eine gewünschte Port-Hamiltonian-Struktur (pH) haben. Die Anwendung auf unteraktuierte mechanische Systeme (UMS) erfordert die Erfüllung von sogenannten Matching Conditions, die meistens die Lösung partieller Differentialgleichungen (PDE) benötigt. Erst kürzlich wurde die IDA-PBC auf implizit modellierte UMS erweitert, bei denen die Systemdynamik in pH-Darstellungen durch Differentialalgebraische Gleichungen (DAE) beschrieben wird. Dieser implizite Ansatz ermöglicht bei einigen Systemklassen, das PDE-Problem zu umgehen und auch eine Ausgangsrückführung zu entwerfen. Die vorliegende Masterarbeit beschäftigt sich mit dem Entwurf und der Implementierung des impliziten IDA-PBC zur Gesamtenergievorgabe auf einem Portalkransystem im Labor des Fachgebiets Regelungstechnik der TU-Ilmenau. Der implizite Regler wird mit einem vereinfachten (expliziten) IDA-PBC verglichen [1]. Dieser Algorithmus gibt ebenso die Gesamtenergie vor und vermeidet das PDE-Problem. In der Masterarbeit wird in diesem Algorithmus ein wesentlicher Implementierungsfehler offengelegt und behoben.
Tesis
Aronsson, Robert, and Martin Högberg. "IAS 40 : The effects of the implementation of IAS 40 for listed investment property companies within the European Union." Thesis, Jönköping University, JIBS, Accounting and Finance, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7767.
Full textBackground: The increased globalization and trade over domestic borders within the European Union (EU) has lead to the implementation of new international accounting standards. This is necessary to create an effective capital market, where comparisons between companies located in different countries can be made, due to a more harmonized accounting. Obstacles to overcome when establish a more harmonized accounting in the EU is for example different accounting backgrounds and valuation methods.
Purpose: The purpose of the thesis is to as far possible study whether the establishment of IAS 40 contributes to an increased harmonization and more comparable accounting of investment property for listed companies within the EU.
Method: This thesis involves both a quantitative –and a qualitative research method. We have used primary data in forms of interviews, and secondary data in forms of annual reports, regulations, literature and articles in the thesis. Using both primary –and secondary data results in a higher reliability and validity.
Frame of reference: There are two alternative valuations methods according to IAS 40, the cost –and the fair value model. The cost model means a valuation to historical cost minus depreciation. Valuation in compliance to the fair value model on the other hand means that the investment property shall be valuated to market value. When using the cost model a note of the fair value shall be included in the financial statement. A company has according to IAS 40 the possibility to choose between internal –or external valuation when estimating the fair value.
Empirical results and analysis: Our empirical result is presented mainly through annual reports from listed investment property companies in Sweden, England and Germany. We found that the fair value model was used by all the analysed companies in Sweden and England in 2005, the year of the implementation of IAS 40 in the EU. By analysing the annul reports from the investment property companies we found indications that the fair value model also tends to become the generally excepted valuation model in Germany. Furthermore, our empirical result shows that a majority of the Swedish investment property companies regularly used internal valuation, but there is a pattern of external valuation as a complement to the internal valuation. In England and Germany all investment property companies used external valuation and there was no use of internal valuation even as a complement to the external valuation.
Conclusions: Based on our empirical results we draw the conclusion that the accounting for listed investment property companies within the EU is more harmonized and comparable today than before the implementation of IAS 40 in 2005. However, IAS 40 gives the companies the possibility to decide weather to use the cost –or the fair value model and the use of external valuation is optional. This can be viewed as obstacles to achieve a total harmonization of the accounting within the EU for listed investment property companies. From our empirical findings we draw the conclusion that the fair value model tends to become the generally excepted valuation model within the EU. Also, we do not perceive the use of the cost model as a barrier to the harmonization process because the fair value still has to be left in a not in the financial statement. However, we believe that in order to achieve a more harmonized and more comparable accounting for listed investment property companies within in the EU a directive about a minimum of external valuation must be included in IAS 40. This in order to avoid companies to use only internal valuation of the properties as this may effect the result.
ABDULLAEV, ZAFAR. "The IAS 41 "Agriculture" and Accounting Regulatory Policies in Uzbekistan, Possible Implementation." Doctoral thesis, Università degli studi di Genova, 2018. http://hdl.handle.net/11567/930835.
Full textGörgin, Robert, and Sergejs Gogolis. "Implementation of IAS 36 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, JIBS, Business Administration, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Full textIn 2005, all groups listed on European stock exchanges are required to prepare their consolidated financial statements according to International Financial Reporting Standards (IFRS). IFRS are different from local regulations across Europe in many aspects, and observers expect the transition process thorny and resource-draining for the companies that undertake it.
The study explores transition difficulties by Swedish bank groups on the way of implementing IAS 39, Financial Instruments: Recognition and Measurement. Deemed the most controversial and challenging standard for adoption by the financial sector, it indeed poses new demandson classification, recognition and measurment of financial instruments, and sets out new hedge accounting rules, previously unseen in Swedish practice. Additionaly, the structure of bank's balance sheets makes IAS 39 also the central one among all other standards in terms of numbers of balance sheet items it impacts.
The study uses qualitative method to explore whether transition to IAS 39 is likely to improve transparency in reporting derivatives. Focus is on use of interest rate swaps as hedging instruments in mitigation of interest rate risk.
It is concluded that differences between two reporting frameworks have been well understood by the banks early in the implementation process. A negative feature of the standard is increased volatility in earnings as a result of more wide-spread reliance on fair value measurement method. This accounting volatility impedes comparability of performance results, as well as conceals true efficiency of economic hedge relationships. To some degree, the volatility can be minimized by the application of hedge accounting. However, a bank must methodically follow a set of rigourous if hegde accounting is to be adopted. Fair value is a more straightforward alternative to hedge accounting , but it brings in additional concerns, and has not yet been endorsed in the EU.
It is additionally argued that recognition of all derivatives on BS and measurement at fair value are two important features of IAS 39 that indeed increases reporting transparency by minimizing risk of undisclosed hidden losses.
Görgin, Robert, and Sergejs Gogolis. "Implementation of IAS 39 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, IHH, Företagsekonomi, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Full textBooks on the topic "IDS IMPLEMENTATION"
R, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1989.
Find full textR, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1990.
Find full textMcElreath, T. Jack. IMS design & implementation techniques. 2nd ed. Wellesley, Mass: QED Information Sciences, 1990.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM IMS version 10 implementation guide: A technical overview. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Find full textBahgat, Ahmad. International accounting standards--IAS 39 accounting for financial instruments: Implementation issues and decision-making dilemma. Abidjan, Côte d'Ivoire: African Development Bank, 2002.
Find full textLipski, Stanislav, Aleksandr Sizov, and Yuriy Cypkin. Implementation of cadastral relations. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1866814.
Full textPolischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Full textWorld Bank. Africa--South Central & Indian Ocean Department. Human Development 1. Implementation completion report (IDA-31360) on a credit in the amount of US$66 million to the Republic of Malawi for a second social action fund project. Washington, D.C?]: Human Development 1, Country Dept. 3, Africa Region, 2004.
Find full textMironova, Svetlana. The doctrine of the financial and legal status of municipalities in the Russian Federation and its implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1819040.
Full textAndrichenko, Lyudmila, A. Postnikov, L. Vasil'eva, Zh Gaunova, E. Nikitina, and Inna Plyugina. Reform of the organization of public power: the main directions of implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1839416.
Full textBook chapters on the topic "IDS IMPLEMENTATION"
Prinz, Wolfgang, Thomas Rose, and Nils Urbach. "Blockchain Technology and International Data Spaces." In Designing Data Spaces, 165–80. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_10.
Full textJingang, Li, Liu Shibin, and Liu Wei. "The Design and Implementation of the IDS Catalogue Data Archive System." In Advances in Intelligent and Soft Computing, 837–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27334-6_99.
Full textPampus, Julia, Brian-Frederik Jahnke, and Ronja Quensel. "Evolving Data Space Technologies: Lessons Learned from an IDS Connector Reference Implementation." In Lecture Notes in Computer Science, 366–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_27.
Full textO’Brien, Martin A., David Mohally, Götz P. Brasche, and Andrea G. Sanfilippo. "Huawei and International Data Spaces." In Designing Data Spaces, 451–69. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_27.
Full textRaja, K., and M. Lilly Florence. "Implementation of IDS Within a Crew Using ID3Algorithm in Wireless Sensor Local Area Network." In Inventive Computation Technologies, 467–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_52.
Full textPriyalakshmi, V., and R. Devi. "Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS." In Proceedings of International Conference on Data Science and Applications, 51–70. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_5.
Full textWadiai, Younes, Yousef El Mourabit, and Mohammed Baslam. "Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network." In Advances in Intelligent Systems and Computing, 206–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73603-3_19.
Full textMehrotra, Latika, Prashant Sahai Saxena, and Nitika Vats Doohan. "Implementation of Modified ID3 Algorithm." In Information and Communication Technology for Sustainable Development, 55–60. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3932-4_6.
Full textElliott, Kim S. "Industrial Building Systems (IBS) Project Implementation." In Modernisation, Mechanisation and Industrialisation of Concrete Structures, 61–124. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118876503.ch2.
Full textJeong, Eunseon, Junyoung Park, Minseong Kim, Chanmin Kim, Soyoung Jung, and Kangbin Yim. "ICS Testbed Implementation Considering Dataset Collection Environment." In Lecture Notes in Networks and Systems, 397–406. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61108-8_39.
Full textConference papers on the topic "IDS IMPLEMENTATION"
Varanasi, Venkata Ramani, and Shaik Razia. "CNN Implementation for IDS." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725426.
Full textMofidi, Farhad, Sena Hounsinou, and Gedare Bloom. "L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks." In IoTDI '23: International Conference on Internet-of-Things Design and Implementation. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3576842.3589170.
Full textSharma, Anshu, and Monika Sharma. "Analysis and implementation of BRO IDS using signature script." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489563.
Full textElhak, Messaoud Dhia, Zitouni Abdelkader, Djezzar Boualem, Benabdelmoumene Abdelmadjid, and Zatout Boumediene. "Fast Ids – Vgs Technique Implementation for NBTI Characterization." In 2020 International Conference on Electrical Engineering (ICEE). IEEE, 2020. http://dx.doi.org/10.1109/icee49691.2020.9249809.
Full textMohamed, Yasir Abdelgadir, and Azween B. Abdullah. "Implementation of IDS with response for securing MANETs." In 2010 International Symposium on Information Technology (ITSim 2010). IEEE, 2010. http://dx.doi.org/10.1109/itsim.2010.5561608.
Full textSaheed, Y. K., R. D. Magaji, A. Tosho, and O. B. Longe,. "Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.
Full textShrivastava, Utpal, and Neelam Sharma. "Feature Selection and Implementation of IDS using Boosting algorithm." In 2020 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2020. http://dx.doi.org/10.1109/compe49325.2020.9200072.
Full text"ANALYSIS, DESIGN AND IMPLEMENTATION OF IDS USING DATA MINING." In 4th International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001516100810086.
Full textMa, Fang, Mingyi Duan, and Yajun Yang. "The research and implementation of an improved IPv6 IDS." In International Conference on Electrical and Electronics Engineering. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iceee140061.
Full textVaid, Chetna, and Harsh K. Verma. "Anomaly-based IDS implementation in cloud environment using BOAT algorithm." In 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2014. http://dx.doi.org/10.1109/icrito.2014.7014762.
Full textReports on the topic "IDS IMPLEMENTATION"
Michelitsch, Roland, Odette Maciel, Claudia Figueroa, Regina Legarreta, Melanie Putic, and Alejandro Ahumada. Management’s Implementation of OVE Recommendations: IDB Group’s Evaluation Recommendation Tracking System. Inter-American Development Bank, July 2019. http://dx.doi.org/10.18235/0002182.
Full textPrince, Zachary M., Jean C. Ragusa, and Yaqi Wang. Improved Quasi-Static Method: IQS Method Implementation for CFEM Diffusion in Rattlesnake. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1261241.
Full textFrost, Sandra, Nigel Lawrence, and William Humbert. Implementation and Demonstration of P4 Software for Improving ICS Protocol Visibility and Control. Office of Scientific and Technical Information (OSTI), January 2023. http://dx.doi.org/10.2172/1909544.
Full textSembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.
Full textSembler, Jose Ignacio, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, Diego Del Pilar, et al. Corporate Evaluation: Evaluation of IDB Invest. Inter-American Development Bank, July 2023. http://dx.doi.org/10.18235/0005014.
Full textBouillon, César P., Maria Fernanda Rodrigo, Michelle Infanzón, Henry Dyer, and Sumiko Andrade Sakaguchi. Approach Paper: IDB Support to Strengthen Public Sector Transparency and Integrity in Latin America and the Caribbean. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003248.
Full textLi, Meng Hua, ed. Smart Manufacturing: National Implementation Framework. Asian Productivity Organization, March 2022. http://dx.doi.org/10.61145/getj1519.
Full textJahromi, Maryam Eslami, and Haleh Ayatollahi. Utilization of telehealth to manage the Covid-19 pandemic in low and middle income countries: a scoping review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, August 2022. http://dx.doi.org/10.37766/inplasy2022.8.0004.
Full textSharples, Jonathan, Dan Bristow, Emma Taylor-Collins, and Eleanor McKillop. What Works Network Implementation Project. Wales Centre for Public Policy - Cardiff University, April 2022. http://dx.doi.org/10.54454/20220411.
Full textTokarieva, Anastasiia V., Nataliia P. Volkova, Inesa V. Harkusha, and Vladimir N. Soloviev. Educational digital games: models and implementation. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3242.
Full text