Results 1 - 10
of
318
A Virtual Machine Introspection Based Architecture for Intrusion Detection
- In Proc. Network and Distributed Systems Security Symposium
, 2003
"... Today's architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host's software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, ..."
Abstract
-
Cited by 423 (5 self)
- Add to MetaCart
, it is more resistant to attack, but has a poor view of what is happening inside the host, making it more susceptible to evasion. In this paper we present an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance. We achieve
Coil sensitivity encoding for fast MRI. In:
- Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
of aliasing plays an important role with respect to SNR. As a rule of thumb it can be said that local SNR improves when the degree of aliasing is reduced. Therefore it is beneficial to exclude a pixel from reconstruction when the corresponding volume contributes no signal, e.g., because it lies outside
DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype
- In Proceedings of the 14th National Computer Security Conference
, 1991
"... Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. The proliferation of heterogeneous computer networks provides additional implications for the intrusion detection problem. Namely, the increa ..."
Abstract
-
Cited by 125 (0 self)
- Add to MetaCart
, the increased connectivity of computer systems gives greater access to outsiders, and makes it easier for intruders to avoid detection. IDS's are based on the belief that an intruder's behavior will be noticeably different from that of a legitimate user. We are designing and implementing a
ID 165644)
, 2012
"... We revisit the problem of the optimization of a silicon-nanocrystal (Si-NC) waveguide, aiming to attain the maximum field confinement inside its nonlinear core and to ensure optimal waveguide performance for a given mode power. Using a Si-NC=SiO 2 slot waveguide as an example, we show that the comm ..."
Abstract
- Add to MetaCart
and zero outside of it, in which case A eff is simply equal to the region's cross-section area a NL . It is not hard to construct a proper factor relating P and I NL , and we introduce a new EMA in the form where NL denotes integration over the nonlinear region. Since the surface integrals
Dying outside: women, imprisonment and post-release mortality
- Women in Corrections: Staff and Clients Conference, Adelaide, Australia, 31 October – 1 November 2000. Griffith, Australian Institute of Criminology (http://www.aic.gov.au/events/aic%20upcoming%20events/2000/~/media/conferences /womencorrections/cookdavi.
, 2000
"... 2Getting out of jail after a long sentence is scary. You’ve got this security for so long. The only thing you have to worry about is yourself and surviving. Stealing a celery stick off the kitchen officer was your biggest problem of the day. Then your find yourself on the street with money to think ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
about and decisions to make. I was happy of course to be getting out, but prison had become my life. I’d had six months out in five years and I was really scared of leaving the life I knew and being insecure. After three and a half years, going out to virtually no support was terrifying. (Leah quoted
Kernighan-Lin Heuristic in an IDS
"... iii Kernighan-Lin Heuristic in an IDS With the need for organizations to stay online and connected to the World Wide Web, the need for security measures is stronger than ever. One important security feature is the utilization of an Intrusion Detection System, IDS. But as this is a relatively new tec ..."
Abstract
- Add to MetaCart
attacks/misuse as it detects traffic that is outside the normal boundaries. Unfortunately this kind of IDS have a tendency to produce a high number of alerts on normal traffic as well. This thesis will investigate if the Kernighan-Lin algorithm may be used in an Intrusion Detection System and compare
EPA FACILITY ID: TX2571724333
"... This document is a public health consultation that describes ATSDR's evaluation of potential health impacts of current air emissions from Kelly Air Force Base (AFB). The focus of the evaluation was non-occupational air exposures to on-base personnel. The current document represents one of sever ..."
Abstract
- Add to MetaCart
provides an evaluation of on-base non-occupational exposures. Other Phase II issues will be addressed in other documents (past air emissions and health outcome data). 3. Phase III will address issues identified outside the purview of the original petition, but expressed as concerns by the community. Phase
Impact of Wind Energy Installations on Domestic Manufacturing and Trade. ID-25
- International Trade Commission
"... Commission (USITC). Office of Industries working papers are the result of the ongoing professional research of USITC staff and solely represent the opinions and professional research of individual authors. These papers do not necessarily represent the views of the U.S. International Trade Commission ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
Commission or any of its individual Commissioners. Working papers are circulated to promote the active exchange of ideas between USITC staff and recognized experts outside the USITC, and to promote professional development of office staff by encouraging outside professional critique of staff research
P UMP Cytoplasm Lip id II
"... The soluble precursor molecule of the peptidoglycan is formed in the cytoplasm. In a second step the N-acetylmuramyl-pentapeptide moiety is transferred to a membrane lipid carrier and coupled to N-acetylglucosamine. In S. aureus most of the glutamate residues of the pentapeptide chain are amidated i ..."
Abstract
- Add to MetaCart
in the course of biosynthesis and an interpeptide bridge of five glycine residues is coupled to the L-lysine residue. This building block, called lipid II, is transported to the outside. The disaccharide unit is linked to the nascent carbohydrate chain of the peptidoglycan by the transglycosylases (1
Results 1 - 10
of
318