Results 11 - 20
of
318
Intrusion Detection System (IDS) framework for Digital Network
"... Abstract: Cyber security has become high priority in Industrial Automation (IA). Here dependable operation is to ensure the security, stability and reliability in power delivery system. Anonymity progress can be easily removed by using the Intrusion Detection System (IDS) framework. In this paper Su ..."
Abstract
- Add to MetaCart
Supervisory Control and Data Acquisition (SCADA)-IDS with protocol based and behavior based analysis is proposed and exemplified in order to detect known and unknown cyber-attacks from inside or outside SCADA systems. This framework provides a hierarchical approach for an integrated security system
The expression pattern of Id4, a novel dominant negative helix-loop-helix protein, is distinct from
- Id1, Id2 and Id3. Nucleic Acids Res
, 1994
"... Molecular Interaction between transcription factors containing an baslc-hellx-loop-hellx (bHLH) domain is known to regulate differentiation In several cellular systems Including myogenesls, neurogenesis and haematopoiesls. DNA-blnding activity of the bHLH proteins Is mediated via the basic region an ..."
Abstract
-
Cited by 27 (0 self)
- Add to MetaCart
, designated Id4. The Id4 protein contains a HLH domain highly conserved among the dnHLH proteins from mouse and drosophlla. Outside of the HLH domain, three additional short regions of the dnHLH proteins show some degree of homology. DNA-bindlng of E47 homo- as well as E47/MyoD heterodimers is Inhibited by Id
RBIDS- IDS with Biometric Authentication and Trace Back Scheme for Enhanced Security
"... There has been an increasing concern over the volume of attacks from international sources towards government and military networks. The next generation wars would all involve computers and network tools, rather than fighter planes and nuclear bombs. Our proposal is a range based intrusion detection ..."
Abstract
- Add to MetaCart
detection system with a trace back scheme to survive against these next generation odds. The proposed system would use a biometric authentication scheme for data transmission internally within the network and the usual Intrusion Detection Scheme for data transmission with outside networks like internet
ID-based key agreement with anonymity for ad hoc networks
- Proc. Embedded and Ubiquitous Computing (EUC) 2007, LNCS
, 2007
"... Abstract. Security support is a must for ad hoc networks. However, existing key agreement schemes for ad hoc networks ignore the issue of entity anonymity. Without anonymity, the adversary can easily identify and track s p e c i f i c e n t i t i e s i n t h e c o mmu n i c a t i o n s . No t o n l ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
l y e n t i t i e s ' mo v e me n t information is valuable to the adversary but also the adversary can launch heavy attacks on those important nodes, based on the information. This paper proposes an ID-based n-party ( 2 n ) key agreement scheme that preserves entity anonymity from outsiders
VENEZUELAN EQUINE ENCEPHALITIS VIRUS IN THE GUINEA PIG MODEL: EVIDENCE FOR EPIZOOTIC VIRULENCE DETERMINANTS OUTSIDE THE E2 ENVELOPE GLYCOPROTEIN GENE
"... Abstract. Epizootic strains of Venezuelan equine encephalitis virus (VEEV) cause epidemics by exploiting equines as highly efficient amplification hosts for mosquito transmission. Although phylogenetic studies indicate that epizootic VEEV strains emerge via mutation from enzootic progenitors that ar ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
animal model that best predicts the ability to generate equine viremia, to assess the role of envelope versus other mutations in the epizootic phenotype. Using reciprocal chimeric viruses generated by swapping the envelope genes of closely related epizootic IC and enzootic ID strains, infections
Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations
, 2008
"... conducted by MIT Lincoln Laboratory. The lecture highlights some of the problems with carrying out such evaluations for IDSs, why this is made hard by real-world problems and nally, concludes with a discussion of our many common IDS evaluation pitfalls which apply more broadly to systems research th ..."
Abstract
- Add to MetaCart
conducted by MIT Lincoln Laboratory. The lecture highlights some of the problems with carrying out such evaluations for IDSs, why this is made hard by real-world problems and nally, concludes with a discussion of our many common IDS evaluation pitfalls which apply more broadly to systems research
The Effect of Globalisation on Industrial Districts in Italy: The Case of Brenta', IDS Working Paper No 144
, 2001
"... This paper is concerned with the impact of globalisation on local competitiveness in Brenta, one of the most important Italian footwear districts. The aim is to integrate the typical industrial district approach with the global value chain approach. To understand the changes confronting Brenta, the ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
towards new value chains? What types of governance characterise the relationships between local and outside actors? Do the chains ’ leaders come from inside or outside the districts? Does the integration of industrial clusters in global value chains enhance or weaken local upgrading strategies? One
No. ID-15 OFFICE OF INDUSTRIES WORKING PAPER U.S. INTERNATIONAL TRADE COMMISSION
, 2006
"... circulated to promote the active exchange of ideas between USITC staff and recognized experts outside the USITC, and to promote professional development of Office staff by encouraging outside professional critique of staff research. The authors are grateful for the thorough review, advice, and guida ..."
Abstract
- Add to MetaCart
circulated to promote the active exchange of ideas between USITC staff and recognized experts outside the USITC, and to promote professional development of Office staff by encouraging outside professional critique of staff research. The authors are grateful for the thorough review, advice
Rehabilitation in Complex Political Emergencies: Is rebuilding civil society the answer? IDS Working Paper 60
, 1997
"... The paper examines the challenge of rehabilitation from comp lex political emergencies (CPEs) and identifies a strategy that is characte rised as a civil society rebuilding approach. It focuses on Somalia and a case study of a CARE project that aims to build the capacity of local NGOs. The paper ar ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
society does hold out the promise of g iving non-military inte rests a stronger voice and starting a process of changing the aid delivery culture. Achiev ing these objecti ves, however, will be a slow and largely Indigenous p rocess and there is a need for lowered expectations about what outside
“This Is Not Normal. I’d Rather Call It.” Personal and Non-Personal SMS Messaging among Finnish Youth
"... This paper is based on an empirical study investigating short message service (SMS) behaviour among Finnish high-school youth. The study seeks to answer the questions if personal messaging needs, i.e. needs coming from within the sender − within the self − are more likely to be successfully SMSed th ..."
Abstract
- Add to MetaCart
than non-personal messages given by an outside person. The study also seeks to clarify if the level of information detail is more likely to be a barrier for SMSing a non-personal message than the length of the given message. The outcome of the study is discussed in terms of understanding SMS activity
Results 11 - 20
of
318