Results for 'intrusion detection'

976 found
Order:
  1.  23
    UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation.Arun Nagaraja, B. Uma & Rajesh Kumar Gunupudi - 2020 - Foundations of Science 25 (4):1049-1075.
    Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  37
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  47
    Evolving intrusion detection rules on mobile ad hoc networks.Sevil Şen & John A. Clark - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou, PRICAI 2008: Trends in Artificial Intelligence. Springer. pp. 1053--1058.
  4.  15
    Improving the efficiency of intrusion detection in information systems.Bouderah Brahim, Nacer Eddine Yousfi, Bourenane Malika & Lounis Ouarda - 2022 - Journal of Intelligent Systems 31 (1):835-854.
    Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree, K nearest (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  19
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  43
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  29
    Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  37
    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model.Basim Mahbooba, Mohan Timilsina, Radhya Sahal & Martin Serrano - 2021 - Complexity 2021:1-11.
    Despite the growing popularity of machine learning models in the cyber-security applications ), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The previous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10. An unsupervised clustering algorithm for intrusion detection.G. Yu, A. G. Ali & B. Nabil - forthcoming - Proc. Of the 16th Conference of the Canadian Society for Computational Studies of Intelligence (Ai 2003), Halifax, Nova Scotia, Canada.
    No categories
     
    Export citation  
     
    Bookmark  
  11. Topic 5-Parallel and Distributed Databases, Data Mining and Knowledge Discovery-Supporting a Real-Time Distributed Intrusion Detection Application on GATES.Qian Zhu, Liang Chen & Gagan Agrawal - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 4128--360.
     
    Export citation  
     
    Bookmark   1 citation  
  12.  29
    The Impact of Different System Call Representations on Intrusion Detection.Sarah Wunderlich, Markus Ring, Dieter Landes & Andreas Hotho - 2022 - Logic Journal of the IGPL 30 (2):239-251.
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related, non-continuous data like system calls of an operating system. This work focuses on five different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encodings and learning word2vec, GloVe or fastText representations of system calls. As (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  33
    A Hybrid Clustering Approach for Network Intrusion Detection Using Cobweb and FFT.Mrutyunjaya Panda & Manas Ranjan Patra - 2009 - Journal of Intelligent Systems 18 (3):229-246.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  39
    Comparison of classification techniques applied for network intrusion detection and classification.Amira Sayed A. Aziz, Sanaa El-Ola Hanafi & Aboul Ella Hassanien - 2017 - Journal of Applied Logic 24:109-118.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. P. Mehrotra, Sharad. Zeng, Daniel, Chen, Hsinchun. Thuraisingham, Bhavani.“A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks--A Friend Approach”. [REVIEW]S. A. Razak, S. Furnell & N. Brooke Clarke - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 3975--590.
    No categories
     
    Export citation  
     
    Bookmark  
  16.  11
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  24
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  21
    Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning.Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luis Calvo-Rolle, Álvaro Herrero & Emilio Corchado - 2022 - Logic Journal of the IGPL 30 (6):1056-1073.
    Detecting intrusions in large networks is a highly demanding task. In order to reduce the computation demand of analysing every single packet travelling along one of such networks, some years ago flows were proposed as a way of summarizing traffic information. Very few research works have addressed intrusion detection in flows from a visualizations perspective. In order to bridge this gap, the present paper proposes the application of a novel projection method (Beta Hebbian Learning) under this framework. With (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  32
    Unsupervised network traffic anomaly detection with deep autoencoders.Vibekananda Dutta, Marek Pawlicki, Rafał Kozik & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):912-925.
    Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  40
    The Intrusive Gloss.George Thomson - 1967 - Classical Quarterly 17 (02):232-.
    In this article I propose to discuss some passages in the Oresteia in order to illustrate the method devised by Heimsoeth and Headlam for the detection of intrusive glosses. Headlam's theory of glosses, which I outlined in a recent article, was based on a systematic study of the ancient lexica and scholia. Further work on the scholia has raised some problems affecting their authenticity, which need to be settled, if they are to be used effectively for the elucidation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  28
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  37
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  15
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  58
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  52
    The Application of the Acoustic Complexity Indices (ACI) to Ecoacoustic Event Detection and Identification (EEDI) Modeling.A. Farina, N. Pieretti, P. Salutari, E. Tognari & A. Lombardi - 2016 - Biosemiotics 9 (2):227-246.
    In programs of acoustic survey, the amount of data collected and the lack of automatic routines for their classification and interpretation can represent a serious obstacle to achieving quick results. To overcome these obstacles, we are proposing an ecosemiotic model of data mining, ecoacoustic event detection and identification, that uses a combination of the acoustic complexity indices and automatically extracts the ecoacoustic events of interest from the sound files. These events may be indicators of environmental functioning at the scale (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  15
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  20
    Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  6
    Influence of autoencoder latent space on classifying IoT CoAP attacks.María Teresa García-Ordás, Jose Aveleira-Mata, Isaías García-Rodrígez, José Luis Casteleiro-Roca, Martín Bayón-Gutiérrez & Héctor Alaiz-Moretón - forthcoming - Logic Journal of the IGPL.
    The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a model-based intrusion detection system (IDS) for IoT environments. Specifically, the study explores the efficacy of an autoencoder’s latent space combined with three different classification techniques. Utilizing a validated IoT dataset, particularly focusing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  28
    On the application of compression-based metrics to identifying anomalous behaviour in web traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  67
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security operator (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  7
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Why ritualized behavior? Precaution systems and action parsing in developmental, pathological and cultural rituals.Pascal Boyer & Pierre Liénard - 2006 - Behavioral and Brain Sciences 29 (6):595-613.
    Ritualized behavior, intuitively recognizable by its stereotypy, rigidity, repetition, and apparent lack of rational motivation, is found in a variety of life conditions, customs, and everyday practices: in cultural rituals, whether religious or non-religious; in many children's complicated routines; in the pathology of obsessive-compulsive disorders (OCD); in normal adults around certain stages of the life-cycle, birthing in particular. Combining evidence from evolutionary anthropology, neuropsychology and neuroimaging, we propose an explanation of ritualized behavior in terms of an evolved Precaution System geared (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  33.  27
    Autonomic defense: Thwarting automated attacks via real‐time feedback control.Derek Armstrong, Sam Carter, Gregory Frazier & Tiffany Frazier - 2003 - Complexity 9 (2):41-48.
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  43
    (1 other version)Wittgenstein's nose.Avrum Stroll - 1986 - In Abraham Zvie Bar-On, Grazer Philosophische Studien. Distributed in the U.S.A. By Humanities Press. pp. 395-413.
    J.J. Gibson claims that one who is looking at Niagara Falls is seeing it directly, whereas one who is looking at a picture of Niagara Falls is seeing it indirectly or mediately. Gibson's cognitivist critics claim that all perception is mediated and that "external objects" are never seen directly. Each side takes the debate to be a scientific issue. But following Wittgenstein's "nose" for detecting philosophical intrusions into what do not appear to be philosophical debates, the author shows how such (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  43
    Listening eye : postmodernism, paranoia, and the hypervisible.Jerry Aline Flieger - 1996 - Diacritics 26 (1):90-107.
    In lieu of an abstract, here is a brief excerpt of the content:The Listening Eye: Postmodernism, Paranoia, and the HypervisibleJerry Aline Flieger (bio)Jean Baudrillard. The Transparency of Evil: Essays on Extreme Phenomena. Trans. James Benedict. London: Verso, 1993. Trans. of La transparence du mal: Essai sur les phénomènes extrêmes. Paris: Galilée, 1990.Jean-François Lyotard. The Inhuman: Reflections on Time. Trans. Geoff Bennington and Rachel Bowlby. Stanford: Stanford UP, 1991. Trans. of L’inhumain. Paris: Galilée, 1988.Slavoj Zizek. Looking Awry: An Introduction to Jacques (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  71
    Human adoption in evolutionary perspective.Joan B. Silk - 1990 - Human Nature 1 (1):25-52.
    Exploitation is a fundamental element of the parental strategies of many species of birds. Cuckoos, for example, lay their eggs in the nest of other birds, who often unwittingly rear the alien nestlings as their own. Nest parasitism is an efficient reproductive strategy for cuckoos, who do not have to worry about building a nest, incubating their eggs, or feeding their nestlings. But not all hosts respond passively to such intrusions. In response to parasitic cowbirds, for example, robins have evolved (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a great (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  44
    Community perspectives on the benefits and risks of technologically enhanced communicable disease surveillance systems: a report on four community juries.Chris Degeling, Stacy M. Carter, Antoine M. van Oijen, Jeremy McAnulty, Vitali Sintchenko, Annette Braunack-Mayer, Trent Yarwood, Jane Johnson & Gwendolyn L. Gilbert - 2020 - BMC Medical Ethics 21 (1):1-14.
    Background Outbreaks of infectious disease cause serious and costly health and social problems. Two new technologies – pathogen whole genome sequencing and Big Data analytics – promise to improve our capacity to detect and control outbreaks earlier, saving lives and resources. However, routinely using these technologies to capture more detailed and specific personal information could be perceived as intrusive and a threat to privacy. Method Four community juries were convened in two demographically different Sydney municipalities and two regional cities in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  22
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an (...) or eavesdropping occurs, it will lead to a severe disfigurement of the whole communication network, and the data will be controlled by wrong malicious users. Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. Therefore, there is a need for end to end security management, which will ensure the security and privacy of the network and will save the data inside networks from malicious users. As the network devices are growing, so the level of threats is also increasing for these devices. The proposed research is an endeavor toward the detection of data packets attack by using the rough set theory for a secure end to end communication. The experimental work was performed by the RSES tool. The accuracy of the K-NN was 88% for the total objects of 8459. For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. The experimental results of the proposed study show that the research is capable of detecting data packets attack. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  38
    The seahorse, the almond, and the night-mare: Elaborative encoding during sleep-paralysis hallucinations?Todd A. Girard - 2013 - Behavioral and Brain Sciences 36 (6):618-619.
    Llewellyn's proposal that rapid eye movement dreaming reflects elaborative encoding mediated by the hippocampus offers an interesting perspective for understanding hallucinations accompanying sleep paralysis. SP arises from anomalous intrusion of REM processes into waking consciousness, including threat-detection systems mediated by the amygdala. Unique aspects of SP hallucinations offer additional prospects for investigation of Llewellyn's theory of elaborative encoding.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  38
    Sperm‐mediated gene transfer: Applications and implications.Kevin Smith & Corrado Spadafora - 2005 - Bioessays 27 (5):551-562.
    Recent developments in studies of sperm‐mediated gene transfer (SMGT) now provide solid ground for the notion that sperm cells can act as vectors for exogenous genetic sequences. A substantive body of evidence indicates that SMGT is potentially useable in animal transgenesis, but also suggests that the final fate of the exogenous sequences transferred by sperm is not always predictable. The analysis of SMGT‐derived offspring has shown the existence of integrated foreign sequences in some cases, while in others stable modifications of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Estimation Des signaux (exercices et problèmes corrigés).A. Quinquis Détection - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  44. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  45
    Flashbacks, intrusions, mind-wandering – Instances of an involuntary memory spectrum: A commentary on Takarangi, Strange, and Lindsay.Thomas Meyer, Henry Otgaar & Tom Smeets - 2015 - Consciousness and Cognition 33:24-29.
  46. (1 other version)Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.David Rose, Wesley Buckwalter & Shaun Nichols - 2015 - Cognitive Science 39 (7).
    How might advanced neuroscience—in which perfect neuro-predictions are possible—interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such (...)
    Direct download  
     
    Export citation  
     
    Bookmark   24 citations  
  47.  50
    The Intrusion of Mercy.Antony Duff - unknown
    On the basis of a communicative theory of criminal punishment, I show how mercy has a significant but limited role to play in the criminal law—in particular (although not only) in criminal sentencing. Mercy involves an intrusion into the realm of criminal law of values and concerns that are not themselves part of the perspective of criminal law: a merciful sentencer acts beyond the limits of her legal role, on the basis of moral considerations that conflict with the demands (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  48.  96
    Detecting Honest People’s Lies in Handwriting: The Power of the Ten Commandments and Internalized Ethical Values.Thomas Li-Ping Tang - 2012 - Journal of Business Ethics 106 (4):389-400.
    Can managers detect honest people’s lies in a handwritten message? In this article, I will briefly discuss graphology and a basic model of interpersonal communication. I will then develop a fundamental theoretical framework of eight principles for detecting lies based on the basic communication model, handwriting analyses, and the following assumptions: For most people, it is easier to tell the truth than to tell lies. This applies to handwritings also. When most honest people lie, they try to hide their stressful (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  49.  19
    Automatic Detection of Defects on Periodically Patterned Textures.P. Nagabhushan, N. U. Bhajantri & V. Asha - 2011 - Journal of Intelligent Systems 20 (3):279-303.
    Defect detection is a major concern in quality control of various products in industries. This paper presents two different machine-vision based methods for detecting defects on periodically patterned textures. In the first method, input defective image is split into several blocks of size same as the size of the periodic unit of the image and chi-square histogram distances of each periodic block with respect to itself and all other periodic blocks are calculated to get a dissimilarity matrix. This dissimilarity (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  19
    Detecting of Interrelationships between Eating Disorders and Self-Harm in Girls during Adolescence.Dominika Doktorová & Patrícia Šomodiová - 2022 - Postmodern Openings 13 (3):13-25.
    Presented research focuses on detecting of interrelationships between the overall rate of self-harm and the symptomatology of eating disorders. The research group consisted of 60 adolescent girls with eating disorders. We used the SHI questionnaire to determine self-harm and EDI-2 to determine the symptoms of individual eating disorders. We detected that there was a moderate positive relationship between self-harm and the overall score in EDI-2 symptoms. We also found moderate and weak positive relationships between eating disorders symptoms and self-harm. We (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976