Добірка наукової літератури з теми "IDS IMPLEMENTATION"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "IDS IMPLEMENTATION".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "IDS IMPLEMENTATION"
Tarkhan, Mahdi, Saeed Bagheri Shouraki, and Seyed Hossein Khasteh. "A novel hardware implementation of IDS method." IEICE Electronics Express 6, no. 23 (2009): 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Повний текст джерелаPaul, Morgan. "Looking to the Future." Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals 4, no. 1 (September 8, 2023): 54–67. http://dx.doi.org/10.29173/pathfinder71.
Повний текст джерелаMizutani, Masayoshi, Shin Shirahata, Masaki Minami, and Jun Murai. "The design and implementation of session-based IDS." Electronics and Communications in Japan (Part I: Communications) 89, no. 3 (March 2006): 46–58. http://dx.doi.org/10.1002/ecja.20251.
Повний текст джерелаBush-Mecenas, Susan, Julie A. Marsh, and Katharine O. Strunk. "Guiding Principals: Middle-Manager Coaching and Human-Capital Reform." Teachers College Record: The Voice of Scholarship in Education 122, no. 10 (October 2020): 1–50. http://dx.doi.org/10.1177/016146812012201004.
Повний текст джерелаMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki, and Ali Rohani. "Memristor Crossbar-Based Hardware Implementation of the IDS Method." IEEE Transactions on Fuzzy Systems 19, no. 6 (December 2011): 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Повний текст джерелаBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss, and Regragui Boubker. "Behavioral Analysis Approach for Likelihood Determination in Cloud IDS: Implementation Architecture." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Повний текст джерелаBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon, and David Morquin. "Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program: Considering Progressive Implementation and Complementary Strategies." Antibiotics 9, no. 12 (November 27, 2020): 848. http://dx.doi.org/10.3390/antibiotics9120848.
Повний текст джерелаMahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (March 31, 2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Повний текст джерелаKim, Song-Mok, and Seungyoung Park. "Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano." Journal of Digital Contents Society 24, no. 11 (November 30, 2023): 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Повний текст джерелаSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Повний текст джерелаДисертації з теми "IDS IMPLEMENTATION"
Fors, Markus, and Christian Grahn. "An implementation of a DNS-based malware detection system." Thesis, Karlstad University, Karlstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6036.
Повний текст джерелаToday’s wide usage of the Internet makes malicious software (malware) and botnets a big problem. While anti-virus software is commonplace today, malware is constantly evolving to remain undetected. Passively monitoring DNS traffic on a network can present a platform for detecting malware on multiple computers at a low cost and low complexity. To explore this avenue for detecting malware we decided it was necessary to design an extensible system where the framework was separate from the actual detection methods. We wanted to divide the system into three parts, one for logging, one for handling modules for detection and one for taking action against suspect traffic. The system we implemented in C collects DNS traffic and processes it with modules that are compiled separately and can be plugged in or out during runtime. Two proof of concept modules have been implemented. One based on a blacklist and one based on geolocation of requested servers. The system is complete to the point of being ready for field testing and implementation of more advanced detection modules.
Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.
Повний текст джерелаNykvist, Carl, and Martin Larsson. "Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157481.
Повний текст джерелаFu, Yulong. "Sécurité Vérification d’implémentation de protocole." Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3003/document.
Повний текст джерелаRegarding the development of computer technologies, computer systems have been deeply used in our daily life. Those systems have become the foundation of our modern information society. Some of them even take responsibilities for many essential and sensitive tasks (e.g., Medical Treatment System, E-Commerce, Airplane System, Spaceship System, etc.). Once those systems are executed with problems, the loss on the economy may reach an unacceptable number. In order to avoid these disappointing situations, the security of the current systems needs to be verified before their installations. While, most of the systems are implemented from protocol specifications, the problems of verifying the security of concrete system can be transformed to verify the security of protocol implementation. In this thesis, we focus on the security verification methods of protocol implementations and we are interested with two main types of network attacks: Denis-of-Services (DoS) attacks and Protocol Authentication attacks. We investigate the features of these attacks and the existed formal verification methods and propose two extended models of IOLTS and the corresponding algorithms to generate the security verification test cases automatically. In order to avoid the possible state explosions, we also formalize the security experiences of the tester as Security Objective to control the test generation on-the-fly. Meanwhile, a modeled based Anomaly Intrusion Detection Systems (IDS) analysis method is also proposed in this thesis, which can enhance the detect abilities of Anomaly IDS. These proposed verification methods are demonstrated with the case study of RADIUS protocol and an integrated GUI tool is also proposed to simply the operations of test generation
Olsson, Jenny, Veronica Karlsson, and Maria Muravskaya. "Swedbank's implementation process of IFRS." Thesis, Jönköping University, JIBS, Business Administration, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-895.
Повний текст джерелаSammanfattning
Bakgrund: En ökad handel över nationsgränserna har skapat en efterfrågan på ett internationellt redovisningsspråk. IASB har därför skapat ett set med högkvalitativa internationella redovisningsstandarder. Från och med 2005 kräver EU att alla företag som är listade på en reglerad marknad inom EU ska an-vända sig av IASBs standarder IFRS.
Problem: Genomförandet av implementeringen av IFRS är olika i olika företag. Vi vill därför undersöka hur implementeringsprocessen var genomförd i Sveriges största bank, Swedbank.
Syfte: Syftet med den här rapporten är att beskriva samt förklara hur förändringen till IFRS genomfördes i Swedbank samt att beskriva de eventuella problem och hinder som implementeringen av dessa standarder kan ha medfört.
Metod: Vi har valt att göra en fallstudie genom att intervjua anställda i Swedbank som har varit delaktiga i implementeringsprocessen. Vi har också intervjuat Deloitte för att få deras syn på en implementeringsprocess av IFRS.
Analys: Vår analys är baserad på empirisk data i jämförelse med ett teoretiskt underlag. Vad vi har kommit fram till är att Swedbank har inkluderat de flesta av de steg som tas upp i teorin angående en implementering av IFRS; de har förberett sig bra samt använt rätt resurser. De har dock avvikit genom att inte utvärdera processen när den var klar.
Slutsats: Swedbank satte ihop en central projekt grupp som skötte implementering-en. De identifierade de ändringar som skulle göras och genomförde dessa. De problem som uppstod i processen har sitt ursprung i FVO och IAS 39.
Abstract
Background: An increase in cross-border trade has created a need for a common international accounting language. IASB therefore created a single set of high quality international accounting standards. As of 2005 all companies listed on a regulated market within the EU are mandated to use IASB’s standard IFRSs.
Problem: The process of implementing IFRS is different in different companies. We therefore want to look at the implementation process in Swedbank, the largest bank in Sweden.
Purpose: The purpose of this study is to describe and explain how the process of the change to IFRSs was done within Swedbank and to outline the problems and obstacles that might have occurred when implementing these new standards.
Method: We have done a case study by interviewing people in Swedbank that took part in the implementation process. We have also done an interview with Deloitte to get their views on a IFRSs implementation process.
Analysis: Our analysis is based on our empirical findings in comparison with our theoretical framework. We found that Swedbank did most of the steps described in the theoretical framework regarding the implementation process; they prepared themselves well and choose the right resources to do so. The deviating step is that no evaluation was done afterwards.
Conclusion: Swedbank used a project group to handle the implementation process. They identified the changes that had to be done and did the change to IFRS. The problems and obstacles that occurred were due to FVO and IAS 39.
Vidal, Sandoval Jesus Enrique. "Implicit IDA-PBC Design and Implementation for a Portal Crane System." Master's thesis, Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15353.
Повний текст джерелаInterconnection and damping assignment passivity-based control (IDA-PBC) ist eine wohlbekannte Methode zur Regelung von nichtlinearen Systemen, die im geschlossenen Regelkreis eine gewünschte Port-Hamiltonian-Struktur (pH) haben. Die Anwendung auf unteraktuierte mechanische Systeme (UMS) erfordert die Erfüllung von sogenannten Matching Conditions, die meistens die Lösung partieller Differentialgleichungen (PDE) benötigt. Erst kürzlich wurde die IDA-PBC auf implizit modellierte UMS erweitert, bei denen die Systemdynamik in pH-Darstellungen durch Differentialalgebraische Gleichungen (DAE) beschrieben wird. Dieser implizite Ansatz ermöglicht bei einigen Systemklassen, das PDE-Problem zu umgehen und auch eine Ausgangsrückführung zu entwerfen. Die vorliegende Masterarbeit beschäftigt sich mit dem Entwurf und der Implementierung des impliziten IDA-PBC zur Gesamtenergievorgabe auf einem Portalkransystem im Labor des Fachgebiets Regelungstechnik der TU-Ilmenau. Der implizite Regler wird mit einem vereinfachten (expliziten) IDA-PBC verglichen [1]. Dieser Algorithmus gibt ebenso die Gesamtenergie vor und vermeidet das PDE-Problem. In der Masterarbeit wird in diesem Algorithmus ein wesentlicher Implementierungsfehler offengelegt und behoben.
Tesis
Aronsson, Robert, and Martin Högberg. "IAS 40 : The effects of the implementation of IAS 40 for listed investment property companies within the European Union." Thesis, Jönköping University, JIBS, Accounting and Finance, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7767.
Повний текст джерелаBackground: The increased globalization and trade over domestic borders within the European Union (EU) has lead to the implementation of new international accounting standards. This is necessary to create an effective capital market, where comparisons between companies located in different countries can be made, due to a more harmonized accounting. Obstacles to overcome when establish a more harmonized accounting in the EU is for example different accounting backgrounds and valuation methods.
Purpose: The purpose of the thesis is to as far possible study whether the establishment of IAS 40 contributes to an increased harmonization and more comparable accounting of investment property for listed companies within the EU.
Method: This thesis involves both a quantitative –and a qualitative research method. We have used primary data in forms of interviews, and secondary data in forms of annual reports, regulations, literature and articles in the thesis. Using both primary –and secondary data results in a higher reliability and validity.
Frame of reference: There are two alternative valuations methods according to IAS 40, the cost –and the fair value model. The cost model means a valuation to historical cost minus depreciation. Valuation in compliance to the fair value model on the other hand means that the investment property shall be valuated to market value. When using the cost model a note of the fair value shall be included in the financial statement. A company has according to IAS 40 the possibility to choose between internal –or external valuation when estimating the fair value.
Empirical results and analysis: Our empirical result is presented mainly through annual reports from listed investment property companies in Sweden, England and Germany. We found that the fair value model was used by all the analysed companies in Sweden and England in 2005, the year of the implementation of IAS 40 in the EU. By analysing the annul reports from the investment property companies we found indications that the fair value model also tends to become the generally excepted valuation model in Germany. Furthermore, our empirical result shows that a majority of the Swedish investment property companies regularly used internal valuation, but there is a pattern of external valuation as a complement to the internal valuation. In England and Germany all investment property companies used external valuation and there was no use of internal valuation even as a complement to the external valuation.
Conclusions: Based on our empirical results we draw the conclusion that the accounting for listed investment property companies within the EU is more harmonized and comparable today than before the implementation of IAS 40 in 2005. However, IAS 40 gives the companies the possibility to decide weather to use the cost –or the fair value model and the use of external valuation is optional. This can be viewed as obstacles to achieve a total harmonization of the accounting within the EU for listed investment property companies. From our empirical findings we draw the conclusion that the fair value model tends to become the generally excepted valuation model within the EU. Also, we do not perceive the use of the cost model as a barrier to the harmonization process because the fair value still has to be left in a not in the financial statement. However, we believe that in order to achieve a more harmonized and more comparable accounting for listed investment property companies within in the EU a directive about a minimum of external valuation must be included in IAS 40. This in order to avoid companies to use only internal valuation of the properties as this may effect the result.
ABDULLAEV, ZAFAR. "The IAS 41 "Agriculture" and Accounting Regulatory Policies in Uzbekistan, Possible Implementation." Doctoral thesis, Università degli studi di Genova, 2018. http://hdl.handle.net/11567/930835.
Повний текст джерелаGörgin, Robert, and Sergejs Gogolis. "Implementation of IAS 36 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, JIBS, Business Administration, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Повний текст джерелаIn 2005, all groups listed on European stock exchanges are required to prepare their consolidated financial statements according to International Financial Reporting Standards (IFRS). IFRS are different from local regulations across Europe in many aspects, and observers expect the transition process thorny and resource-draining for the companies that undertake it.
The study explores transition difficulties by Swedish bank groups on the way of implementing IAS 39, Financial Instruments: Recognition and Measurement. Deemed the most controversial and challenging standard for adoption by the financial sector, it indeed poses new demandson classification, recognition and measurment of financial instruments, and sets out new hedge accounting rules, previously unseen in Swedish practice. Additionaly, the structure of bank's balance sheets makes IAS 39 also the central one among all other standards in terms of numbers of balance sheet items it impacts.
The study uses qualitative method to explore whether transition to IAS 39 is likely to improve transparency in reporting derivatives. Focus is on use of interest rate swaps as hedging instruments in mitigation of interest rate risk.
It is concluded that differences between two reporting frameworks have been well understood by the banks early in the implementation process. A negative feature of the standard is increased volatility in earnings as a result of more wide-spread reliance on fair value measurement method. This accounting volatility impedes comparability of performance results, as well as conceals true efficiency of economic hedge relationships. To some degree, the volatility can be minimized by the application of hedge accounting. However, a bank must methodically follow a set of rigourous if hegde accounting is to be adopted. Fair value is a more straightforward alternative to hedge accounting , but it brings in additional concerns, and has not yet been endorsed in the EU.
It is additionally argued that recognition of all derivatives on BS and measurement at fair value are two important features of IAS 39 that indeed increases reporting transparency by minimizing risk of undisclosed hidden losses.
Görgin, Robert, and Sergejs Gogolis. "Implementation of IAS 39 by Swedish Banks : Interest Rate Swaps in Hedging Applications." Thesis, Jönköping University, IHH, Företagsekonomi, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Повний текст джерелаКниги з теми "IDS IMPLEMENTATION"
R, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1989.
Знайти повний текст джерелаR, Nestor John, ed. IDL: The language and its implementation. Englewood Cliffs, N.J: Prentice Hall, 1990.
Знайти повний текст джерелаMcElreath, T. Jack. IMS design & implementation techniques. 2nd ed. Wellesley, Mass: QED Information Sciences, 1990.
Знайти повний текст джерелаInternational Business Machines Corporation. International Technical Support Organization, ed. IBM IMS version 10 implementation guide: A technical overview. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Знайти повний текст джерелаBahgat, Ahmad. International accounting standards--IAS 39 accounting for financial instruments: Implementation issues and decision-making dilemma. Abidjan, Côte d'Ivoire: African Development Bank, 2002.
Знайти повний текст джерелаLipski, Stanislav, Aleksandr Sizov, and Yuriy Cypkin. Implementation of cadastral relations. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1866814.
Повний текст джерелаPolischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Повний текст джерелаWorld Bank. Africa--South Central & Indian Ocean Department. Human Development 1. Implementation completion report (IDA-31360) on a credit in the amount of US$66 million to the Republic of Malawi for a second social action fund project. Washington, D.C?]: Human Development 1, Country Dept. 3, Africa Region, 2004.
Знайти повний текст джерелаMironova, Svetlana. The doctrine of the financial and legal status of municipalities in the Russian Federation and its implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1819040.
Повний текст джерелаAndrichenko, Lyudmila, A. Postnikov, L. Vasil'eva, Zh Gaunova, E. Nikitina, and Inna Plyugina. Reform of the organization of public power: the main directions of implementation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1839416.
Повний текст джерелаЧастини книг з теми "IDS IMPLEMENTATION"
Prinz, Wolfgang, Thomas Rose, and Nils Urbach. "Blockchain Technology and International Data Spaces." In Designing Data Spaces, 165–80. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_10.
Повний текст джерелаJingang, Li, Liu Shibin, and Liu Wei. "The Design and Implementation of the IDS Catalogue Data Archive System." In Advances in Intelligent and Soft Computing, 837–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27334-6_99.
Повний текст джерелаPampus, Julia, Brian-Frederik Jahnke, and Ronja Quensel. "Evolving Data Space Technologies: Lessons Learned from an IDS Connector Reference Implementation." In Lecture Notes in Computer Science, 366–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_27.
Повний текст джерелаO’Brien, Martin A., David Mohally, Götz P. Brasche, and Andrea G. Sanfilippo. "Huawei and International Data Spaces." In Designing Data Spaces, 451–69. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_27.
Повний текст джерелаRaja, K., and M. Lilly Florence. "Implementation of IDS Within a Crew Using ID3Algorithm in Wireless Sensor Local Area Network." In Inventive Computation Technologies, 467–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_52.
Повний текст джерелаPriyalakshmi, V., and R. Devi. "Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS." In Proceedings of International Conference on Data Science and Applications, 51–70. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_5.
Повний текст джерелаWadiai, Younes, Yousef El Mourabit, and Mohammed Baslam. "Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network." In Advances in Intelligent Systems and Computing, 206–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73603-3_19.
Повний текст джерелаMehrotra, Latika, Prashant Sahai Saxena, and Nitika Vats Doohan. "Implementation of Modified ID3 Algorithm." In Information and Communication Technology for Sustainable Development, 55–60. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3932-4_6.
Повний текст джерелаElliott, Kim S. "Industrial Building Systems (IBS) Project Implementation." In Modernisation, Mechanisation and Industrialisation of Concrete Structures, 61–124. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118876503.ch2.
Повний текст джерелаJeong, Eunseon, Junyoung Park, Minseong Kim, Chanmin Kim, Soyoung Jung, and Kangbin Yim. "ICS Testbed Implementation Considering Dataset Collection Environment." In Lecture Notes in Networks and Systems, 397–406. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61108-8_39.
Повний текст джерелаТези доповідей конференцій з теми "IDS IMPLEMENTATION"
Varanasi, Venkata Ramani, and Shaik Razia. "CNN Implementation for IDS." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725426.
Повний текст джерелаMofidi, Farhad, Sena Hounsinou, and Gedare Bloom. "L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks." In IoTDI '23: International Conference on Internet-of-Things Design and Implementation. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3576842.3589170.
Повний текст джерелаSharma, Anshu, and Monika Sharma. "Analysis and implementation of BRO IDS using signature script." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489563.
Повний текст джерелаElhak, Messaoud Dhia, Zitouni Abdelkader, Djezzar Boualem, Benabdelmoumene Abdelmadjid, and Zatout Boumediene. "Fast Ids – Vgs Technique Implementation for NBTI Characterization." In 2020 International Conference on Electrical Engineering (ICEE). IEEE, 2020. http://dx.doi.org/10.1109/icee49691.2020.9249809.
Повний текст джерелаMohamed, Yasir Abdelgadir, and Azween B. Abdullah. "Implementation of IDS with response for securing MANETs." In 2010 International Symposium on Information Technology (ITSim 2010). IEEE, 2010. http://dx.doi.org/10.1109/itsim.2010.5561608.
Повний текст джерелаSaheed, Y. K., R. D. Magaji, A. Tosho, and O. B. Longe,. "Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.
Повний текст джерелаShrivastava, Utpal, and Neelam Sharma. "Feature Selection and Implementation of IDS using Boosting algorithm." In 2020 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2020. http://dx.doi.org/10.1109/compe49325.2020.9200072.
Повний текст джерела"ANALYSIS, DESIGN AND IMPLEMENTATION OF IDS USING DATA MINING." In 4th International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001516100810086.
Повний текст джерелаMa, Fang, Mingyi Duan, and Yajun Yang. "The research and implementation of an improved IPv6 IDS." In International Conference on Electrical and Electronics Engineering. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iceee140061.
Повний текст джерелаVaid, Chetna, and Harsh K. Verma. "Anomaly-based IDS implementation in cloud environment using BOAT algorithm." In 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2014. http://dx.doi.org/10.1109/icrito.2014.7014762.
Повний текст джерелаЗвіти організацій з теми "IDS IMPLEMENTATION"
Michelitsch, Roland, Odette Maciel, Claudia Figueroa, Regina Legarreta, Melanie Putic, and Alejandro Ahumada. Management’s Implementation of OVE Recommendations: IDB Group’s Evaluation Recommendation Tracking System. Inter-American Development Bank, July 2019. http://dx.doi.org/10.18235/0002182.
Повний текст джерелаPrince, Zachary M., Jean C. Ragusa, and Yaqi Wang. Improved Quasi-Static Method: IQS Method Implementation for CFEM Diffusion in Rattlesnake. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1261241.
Повний текст джерелаFrost, Sandra, Nigel Lawrence, and William Humbert. Implementation and Demonstration of P4 Software for Improving ICS Protocol Visibility and Control. Office of Scientific and Technical Information (OSTI), January 2023. http://dx.doi.org/10.2172/1909544.
Повний текст джерелаSembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.
Повний текст джерелаSembler, Jose Ignacio, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, Diego Del Pilar, et al. Corporate Evaluation: Evaluation of IDB Invest. Inter-American Development Bank, July 2023. http://dx.doi.org/10.18235/0005014.
Повний текст джерелаBouillon, César P., Maria Fernanda Rodrigo, Michelle Infanzón, Henry Dyer, and Sumiko Andrade Sakaguchi. Approach Paper: IDB Support to Strengthen Public Sector Transparency and Integrity in Latin America and the Caribbean. Inter-American Development Bank, April 2021. http://dx.doi.org/10.18235/0003248.
Повний текст джерелаLi, Meng Hua, ed. Smart Manufacturing: National Implementation Framework. Asian Productivity Organization, March 2022. http://dx.doi.org/10.61145/getj1519.
Повний текст джерелаJahromi, Maryam Eslami, and Haleh Ayatollahi. Utilization of telehealth to manage the Covid-19 pandemic in low and middle income countries: a scoping review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, August 2022. http://dx.doi.org/10.37766/inplasy2022.8.0004.
Повний текст джерелаSharples, Jonathan, Dan Bristow, Emma Taylor-Collins, and Eleanor McKillop. What Works Network Implementation Project. Wales Centre for Public Policy - Cardiff University, April 2022. http://dx.doi.org/10.54454/20220411.
Повний текст джерелаTokarieva, Anastasiia V., Nataliia P. Volkova, Inesa V. Harkusha, and Vladimir N. Soloviev. Educational digital games: models and implementation. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3242.
Повний текст джерела