Skip to main content
    • by 
    •   3  
      EconomicsProductivityIDS
    • by 
    •   5  
      FeaturesIDSDatasetKDDcup
    • by 
    •   20  
      PsychologyCognitive ScienceComputer ScienceJapanese
Diplomsko delo popisuje in razčlenjuje zgodovino študentskih gibanj v Sloveniji. Poleg začetnih poglavij, ki zaobjemajo študentsko gibanje v 20. stoletju, se osrednji del koncentrira na sodobno zgodovino 21. stoletja, v čas oživljanja... more
    • by 
    •   20  
      Student movementsIDSMSUIskra
Mobile Ad-Ho c Network (MANET) is one of the most promising technologi es that have applications in military, environm ental, space exploration and forestry industry areas. This typ e of network has attractive features such as its low... more
    • by 
    •   6  
      Mobile Ad Hoc NetworksNetwork SecuritySecurityIntrusion Detection Systems
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
    • by 
    •   48  
      Information SystemsComputer Security And ReliabilityInformation ScienceInformation Technology
"Network intrusion detection system (NIDS)" monitors traffic on a network looking for doubtful activity, which could be an attack or illegal activity. The intrusion detection techniques based upon data mining are generally plummet into... more
    • by 
    •   3  
      Computers and Networks EngineeringIDSIntrusion Detection Systems (IDSs)
    • by  and +1
    •   4  
      Game TheoryCryptographyIDSIntrusion Detection System
The use of the Internet has increased in all areas in recent years. With the huge growth and use of the internet increasing, there have been an increase in the number of intrusions and hackers. The risk of intrusion in the network... more
    • by 
    •   6  
      Anomaly DetectionIDSFirewallMisuse Detection
In In spite of the tremendous growth of technologies in computer networking and information technology, still we lack in preventing our resources from theft/attacks. This problem is very big as far as industry / companies are concerned.... more
    • by 
    •   14  
      Computer ScienceArchitectureRiskIDPs
    • by 
    •   5  
      IDSIntrusion Detection Systems (IDSs)SNORT IDS NetworkSnort
    • by 
    •   20  
      AccountingInvestingIDSLabour markets
    • by 
    •   5  
      Machine LearningData MiningAnomaly DetectionIDS
With the increased dependence of organizations on technological solutions, the cyber threats have become some of the major concerns for the very existence of the businesses. Thus, the security measures to be implemented need to go beyond... more
    • by 
    •   45  
      Information SystemsComputer ScienceComputer Security And ReliabilityInformation Science
    • by 
    •   8  
      Machine LearningNetwork SecurityComputer NetworksIDS
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
व्यक्ति के व्यवहार का निर्धारण स्वयं केवल व्यक्ति के द्वारा नहीं होता है अपितु उसका व्यवहार पर्यावरण, आय-व्यय, राजनीति, शिक्षा, पास-पड़ोस, स्वानुभव, परिवार, समाज, सस्कृति, धर्म, जाति, राष्ट्र एवं तात्कालिक परिस्थितियों आदि से निर्धारित... more
    • by 
    •   8  
      PsychologyCognitive PsychologyDiaspora StudiesHindi/Urdu
    • by 
    •   18  
      IDSVpnPKIBiométrie
    • by 
    •   4  
      Machine LearningNetwork SecurityIDSDenial of Service
Onomatopoeia are frequently identified amongst infants’ earliest words (Menn & Vihman, 2011), yet few authors have considered why this might be, and even fewer have explored this phenomenon empirically. Here we analyze mothers’ production... more
    • by 
    •   10  
      Language AcquisitionLanguage Acquisition and DevelopmentOnomatopoeiaIDS
It is the aim of this study to establish live neonatal nurse and parental infant-directed singing as a potentially efficacious intervention that is beneficial to the health and development of infants in neonatal care and which could... more
    • by 
    •   19  
      MusicologyMusic therapy (Psychology)Neonatal NursingMusic Therapy
In the last few decades, the neural network has been solving a variety of complex problems in engineering, science, finance, and market analysis. Among them, one of the important problems is a protection system against of threat of... more
    • by  and +2
    •   5  
      Recurrent Neural NetworkIDSDeep LearningNSL KDD
    • by 
    •   52  
      MarketingManufacturingAdvertisingTelecommunications
Plant acclimation to stress is associated with profound changes in proteome composition. Since proteins are directly involved in plant stress response, proteomics studies can significantly contribute to unravel the possible relationships... more
    • by 
    •   48  
      BiochemistryStressProteomicsPPP
Hybrid intrusion detection systems that make use of data mining techniques, in order to improve effectiveness, have been actively pursued in the last decade. However, their complexity to build detection models has become very expensive... more
    • by 
    •   3  
      Data MiningIDSIntrusion Detection Systems (IDSs)
In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we... more
    • by 
    •   7  
      Computer ScienceNetwork SecurityIDSTraffic analysis
    • by 
    •   6  
      Machine LearningData MiningNetwork SecurityTraffic Engineering
    • by 
    •   8  
      IDSSCADAFirewallCountermeasures
Dalam beberapa tahun terakhir, kemajuan teknologi membuat beberapa perusahaan baik yang sedang berkembang (startup) maupun maju berupaya mengikuti arus teknologi terbaru yaitu Cloud Computing. Atas landasan kemajuan teknologi banyak... more
    • by  and +1
    •   3  
      Network SecurityCloud ComputingIDS
    • by 
    •   2  
      Genetic AlgorithmsIDS
    • by 
    •   7  
      Information SecurityComputer NetworksSecurityComputer Security
    • by 
    •   20  
      Economic GrowthHuman DevelopmentDeveloping CountriesEconomic policy
    • by 
    •   12  
      Artificial IntelligenceSupply Chain ManagementLogisticsAgent Based Simulation
    • by 
    •   5  
      Scanning Electron MicroscopyIDSMicrostructuresBulk Density
    • by  and +1
    •   4  
      Human GeographyApplied EconomicsIDSPublic Administration and Policy
Data Security has become a very serious part of any organizational information system. Internet threats have become more intelligent so it can deceive the basic security solutions such as firewalls and antivirus scanners. To enhance the... more
    • by 
    •   5  
      Data MiningAnomaly DetectionIDSNIDS
    • by 
    •   9  
      AlgorithmsLogicDatabase SystemsComputer Networks
    • by 
    •   3  
      Network SecurityEvaluationIDS
    • by 
    •   4  
      Human GeographyApplied EconomicsIDSPublic Administration and Policy
    • by  and +1
    •   4  
      Health EconomicsHigher EducationImpact AssessmentIDS
Abstract: In this paper, we discuss the cloud security issues. Cloud computing is a “network of network” over the internet, therefore, chances of intrusion is more with the erudition of intrusion attack. Cloud system security is one of... more
    • by 
    •   7  
      Cloud ComputingAnalysisIDSAttack
    • by 
    •   6  
      NS2IDSManetAODV
    • by 
    •   8  
      Machine LearningData MiningNetwork SecurityAI
    • by 
    •   4  
      Human GeographyApplied EconomicsIDSPublic Administration and Policy
    • by 
    •   8  
      Artificial IntelligenceInformation SecurityMachine LearningData Mining
... Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley. [2] Mokube, I. & Adams M., 2007. ... (2007a). Know your enemy: Honeynets. ... [24] Provos N. and Holz T. 2007, Virtual Honeypots : From Botnets... more
    • by 
    •   7  
      Computer ScienceNetwork SecurityIDSTraffic analysis
    • by 
    •   12  
      Graph TheoryComputational ModelingEvaluationConstraint Programming
    • by 
    •   64  
      Environmental ScienceForestryClimate ChangeWetlands
    • by 
    •   11  
      LawDempster-Shafer AnalysisProbabilityUncertainty
Mendeteksi Instrusi jaringan dan mencegah ancaman aktor dunia maya dari tujuannya melakukan kejahatan siber adalah langkah-langkah penting untuk menjaga keamanan siber.. Kesadaran dan kewaspadaan terhadap keamanan siber setiap organisasi... more
    • by  and +1
    •   5  
      Network ForensicsIDSNIDSSecurity Onion