Auswahl der wissenschaftlichen Literatur zum Thema „SNORD“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "SNORD" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "SNORD":

1

Cohen, Eran, Dana Avrahami, Kati Frid, Tamar Canello, Ephrat Levy Lahad, Sharon Zeligson, Shira Perlberg et al. „Snord 3A: A Molecular Marker and Modulator of Prion Disease Progression“. PLoS ONE 8, Nr. 1 (21.01.2013): e54433. http://dx.doi.org/10.1371/journal.pone.0054433.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kishore, Shivendra, Amit Khanna, Zhaiyi Zhang, Jingyi Hui, Piotr J. Balwierz, Mihaela Stefan, Carol Beach, Robert D. Nicholls, Mihaela Zavolan und Stefan Stamm. „The snoRNA MBII-52 (SNORD 115) is processed into smaller RNAs and regulates alternative splicing“. Human Molecular Genetics 19, Nr. 7 (06.01.2010): 1153–64. http://dx.doi.org/10.1093/hmg/ddp585.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ho, Shuk-Mei, Ana Cheong, Hung-Ming Lam, Wen-Yang Hu, Guang-Bin Shi, Xuegong Zhu, Jing Chen et al. „Exposure of Human Prostaspheres to Bisphenol A Epigenetically Regulates SNORD Family Noncoding RNAs via Histone Modification“. Endocrinology 156, Nr. 11 (06.08.2015): 3984–95. http://dx.doi.org/10.1210/en.2015-1067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Askarian-Amiri, M. E., J. Crawford, J. D. French, C. E. Smart, M. A. Smith, M. B. Clark, K. Ru et al. „SNORD-host RNA Zfas1 is a regulator of mammary development and a potential marker for breast cancer“. RNA 17, Nr. 5 (01.04.2011): 878–91. http://dx.doi.org/10.1261/rna.2528811.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Shaw, P. J., A. F. Beven, D. J. Leader und J. W. Brown. „Localization and processing from a polycistronic precursor of novel snoRNAs in maize“. Journal of Cell Science 111, Nr. 15 (01.08.1998): 2121–28. http://dx.doi.org/10.1242/jcs.111.15.2121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
We have shown previously that groups of U14 snoRNA genes are clustered with other, novel snoRNAs in maize. These genes are transcribed polycistronically from an upstream promoter to give a precursor snoRNA, which is processed by a splicing-independent mechanism. The clusters contain both box C/D snoRNAs, thought to guide rRNA O-ribose methylations, and the first plant box H/ACA snoRNA so far identified, thought to guide an rRNA pseudo-uridylation. Here we show that four novel snoRNAs identified as members of U14-containing gene clusters each show distinct sub-nucleolar localizations. Two of the snoRNAs (snoR2, a box H/ACA snoRNA, and snoR3, a box C/D snoRNA) colocalise closely with nucleolar rDNA transcription sites. A third box C/D snoRNA, U49, is localised to a more extended region which includes the transcription sites. On the other hand snoR1, another box C/D snoRNA, is located in a quite different region of the nucleolus, and shows a similar distribution to that of 7–2/MRP, a snoRNA involved in the later pre-rRNA cleavage reactions. This may indicate that this snoRNA is involved at later stages of processing, whereas the other snoRNAs are involved early or cotranscriptionally. Probes to intergenic spacer regions of the precursor snoRNA have been used to determine the location of the precursor. This shows a clear labelling of both the dense fibrillar component of the nucleolus, and of coiled bodies. This distribution implies that the polycistronic precursor is imported into the nucleolus for processing to the mature snoRNAs, and that the import or processing pathway involves coiled bodies.
6

Akhtari, Farida S., Tammy M. Havener, Masahide Fukudo, John R. Jack, Howard L. McLeod, Tim Wiltshire und Alison A. Motsinger-Reif. „The influence of Neanderthal alleles on cytotoxic response“. PeerJ 6 (23.10.2018): e5691. http://dx.doi.org/10.7717/peerj.5691.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Various studies have shown that people of Eurasian origin contain traces of DNA inherited from interbreeding with Neanderthals. Recent studies have demonstrated that these Neanderthal variants influence a range of clinically important traits and diseases. Thus, understanding the genetic factors responsible for the variability in individual response to drug or chemical exposure is a key goal of pharmacogenomics and toxicogenomics, as dose responses are clinically and epidemiologically important traits. It is well established that ethnic and racial differences are important in dose response traits, but to our knowledge the influence of Neanderthal ancestry on response to xenobiotics is unknown. Towards this aim, we examined if Neanderthal ancestry plays a role in cytotoxic response to anti-cancer drugs and toxic environmental chemicals. We identified common Neanderthal variants in lymphoblastoid cell lines (LCLs) derived from the globally diverse 1000 Genomes Project and Caucasian cell lines from the Children’s Hospital of Oakland Research Institute. We analyzed the effects of these Neanderthal alleles on cytotoxic response to 29 anti-cancer drugs and 179 environmental chemicals at varying concentrations using genome-wide data. We identified and replicated single nucleotide polymorphisms (SNPs) from these association results, including a SNP in the SNORD-113 cluster. Our results also show that the Neanderthal alleles cumulatively lead to increased sensitivity to both the anti-cancer drugs and the environmental chemicals. Our results demonstrate the influence of Neanderthal ancestry-informative markers on cytotoxic response. These results could be important in identifying biomarkers for personalized medicine or in dissecting the underlying etiology of dose response traits.
7

Salminen, Iiro Ilmari, Bernard J. Crespi und Mikael Mokkonen. „Baby food and bedtime: Evidence for opposite phenotypes from different genetic and epigenetic alterations in Prader-Willi and Angelman syndromes“. SAGE Open Medicine 7 (Januar 2019): 205031211882358. http://dx.doi.org/10.1177/2050312118823585.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Prader–Willi and Angelman syndromes are often referred to as a sister pair of neurodevelopmental disorders, resulting from different genetic and epigenetic alterations to the same chromosomal region, 15q11-q13. Some of the primary phenotypes of the two syndromes have been suggested to be opposite to one another, but this hypothesis has yet to be tested comprehensively, and it remains unclear how opposite effects could be produced by changes to different genes in one syndrome compared to the other. We evaluated the evidence for opposite effects on sleep and eating phenotypes in Prader–Willi syndrome and Angelman syndrome, and developed physiological–genetic models that represent hypothesized causes of these differences. Sleep latency shows opposite deviations from controls in Prader–Willi and Angelman syndromes, with shorter latency in Prader–Willi syndrome by meta-analysis and longer latency in Angelman syndrome from previous studies. These differences can be accounted for by the effects of variable gene dosages of UBE3A and MAGEL2, interacting with clock genes, and leading to acceleration (in Prader–Willi syndrome) or deceleration (in Angelman syndrome) of circadian rhythms. Prader–Willi and Angelman syndromes also show evidence of opposite alterations in hyperphagic food selectivity, with more paternally biased subtypes of Angelman syndrome apparently involving increased preference for complementary foods (“baby foods”); hedonic reward from eating may also be increased in Angelman syndrome and decreased in Prader–Willi syndrome. These differences can be explained in part under a model whereby hyperphagia and food selectivity are mediated by the effects of the genes SNORD-116, UBE3A and MAGEL2, with outcomes depending upon the genotypic cause of Angelman syndrome. The diametric variation observed in sleep and eating phenotypes in Prader–Willi and Angelman syndromes is consistent with predictions from the kinship theory of imprinting, reflecting extremes of higher resource demand in Angelman syndrome and lower demand in Prader–Willi syndrome, with a special emphasis on social–attentional demands and attachment associated with bedtime, and feeding demands associated with mother-provided complementary foods compared to offspring-foraged family-type foods.
8

Supriyatno, Bambang, Rusmala Deviani, Alan R. Tumbelaka, Evita KB Ifran und Nastiti N. Rahajoe. „Characteristics and risk factors of snoring and the prevalence of suspected obstructive sleep apnea in children“. Paediatrica Indonesiana 45, Nr. 1 (10.10.2016): 40. http://dx.doi.org/10.14238/pi45.1.2005.40-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Background Snoring as a consequence of upper airway obstruc-tion is common in children. Snoring can be considered as normal,but might also reflect a disease such as obstructive sleep apnea(OSA), which is associated with serious morbidities. In Indonesia,data on the characteristics and risk factors of snoring and obstruc-tive sleep apnea is limitedObjectives The aims of this study were to find out the character-istics and risk factors of snoring in children and to determine theprevalence of suspected OSA in snoring children.Methods A cross-sectional study was carried out on children aged5-13 years using parental questionnaires scored according to theBrouilette formula. All children underwent physical examination forweight, height and tonsil size. Adenoid radiology was performedon part of the samples.Results Of the 917 questionnaires distributed, only 658 were com-pleted. The ratio of boys to girls was equal. Obesity was detectedin 18.3% of children, among whom 54.2% snored. Obese childrenwere 2.1 times more likely to snore. Besides obesity, rhinitis andatopy were found to be associated with snoring (PR= , 95%CI ;and PR= , 95%CI ; respectively). Asthma and tonsil hypertrophywere shown not to be predisposing factors of snoring. Childrenwith adenoid hypertrophy were 1.8 times more likely to snore ha-bitually. The prevalence of snoring and suspected OSA in childrenaged 5-13 years were 31.6% and 5.9%, respectively.Conclusion Risk factors of snoring were obesity, adenoid hyper-trophy, atopy and rhinitis. Prevalence of snoring in children age 5-13 years was 31.6% and that of suspected OSA cases was 5.9%.
9

Sabekti, Muhamad Agung. „Pembuatan Web Interface Snort untuk Managemen Firewall dengan Operasi CRUD (Create, Read, Update, Delete) pada File System Snort dan Pengujian Web dengan Serangan serta Notifikasi pada Email dan Telegram“. Indonesian Journal of Applied Informatics 3, Nr. 2 (04.08.2019): 74. http://dx.doi.org/10.20961/ijai.v3i2.27836.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
<p><em>Snort</em> merupakan salah satu aplikasi <em>firewall</em> yang dikonfigurasi dalam terminal linux, meliputi konfigurasi <em>snort</em>, <em>input rule snort</em>, dan hasil alert <em>snort</em> pada terminal linux. Untuk mempermudah monitoring alert diterminal linux, maka alert diimplementasikan pada email dan telegram serta guna mempermudah dalam aktifitas dalam aktifitas input rule snort maka dibuatlah <em>web interface snort </em>. Metode untuk menangani Snort berjalan pada <em>mode inline</em> dengan menggunakan modul <em>daq_afpacket</em> dalam snort itu sendiri, dan untuk melakukan blok ketika terjadi serangan, snort menggunakan <em>firewall iptables</em>. Alert diimplementasikan pada email menggunakan protokol <em>ssmtp</em> dan pada telegram menggunakan id dan api telegram. Hasil dari penelitian menyatakan pembuatan web <em>interface</em> dapat dengan mudah mengelola <em>rule</em> dan alert <em>snort</em>, serta dapat diaplikasikan dalam beberapa serangan yang diujikan.</p><p>_______________________________________________</p><p>Abstract</p><p><em>In general, snort is a firewall application that is configured in Linux terminals, including the implementation of snort, input snort rules, and snort warning results on Linux terminals. To monitor the linux warning alarm, the alerts are implemented on e-mail and telegram, as well as for input information in snort mode and then create a snort web interface. The method for handling Snort runs in inline mode by using the daq_afpacket module in the snort itself, and to block when an attack occurs, snort uses the iptables firewall. Alerts are implemented in e-mail using the ssmtp protocol and on telegrams using id and telegram fires. The results of the study state that making web interfaces can easily manage rules and snort alerts, and can be applied in several attacks that are tested.</em></p>
10

Karunajeewa, Asela S., Udantha R. Abeyratne und Craig Hukins. „Silence–breathing–snore classification from snore-related sounds“. Physiological Measurement 29, Nr. 2 (23.01.2008): 227–43. http://dx.doi.org/10.1088/0967-3334/29/2/006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "SNORD":

1

Hebras, Jade. „Caractérisation moléculaire du petit ARN nucléolaire SNORD115 : un rôle dans la régulation de l'expression et de la fonction du récepteur à la sérotonine 5-HT2C ?“ Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30209.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Le nucléole des mammifères contient des centaines de petits ARN nucléolaires à boîte C/D (SNORD) dont la grande majorité guide une 2'-O-ribose méthylation sur les précurseurs des ARN ribosomiques (pré-ARNr). Certains SNORD facilitent aussi les clivages que subissent le pré-ARNr ou modifient le petit ARN nucléaire U6. Des travaux récents laissent également entrevoir que certains SNORD interagissent avec des ARNm. C'est le cas par exemple pour SNORD115 qui est au cœur de mon travail de thèse. SNORD115 est exprimé uniquement dans le cerveau à partir de nombreux gènes répétés en tandem situés au locus SNURF-SNRPN dont l'expression est contrôlée par l'empreinte génomique parentale. Des défauts génétiques associés à ce locus chromosomique sont associés à une maladie rare: le syndrome de Prader-Willi (SPW). SNORD115 est remarquable car il possède une longue complémentarité conservée avec l'ARNm codant un récepteur à la sérotonine, le variant 5-HT2C. Certains travaux proposent que SNORD115 régule la voie 5-HT2C en modulant l'épissage alternatif ou l'édition A vers I du pré-ARNm 5-HT2C. Un défaut dans l'activité du 5-HT2C pourrait être à l'origine de l'hyperphagie et/ou des anomalies comportementales qui caractérisent le SPW. Mon projet de thèse principal consistait à éprouver cette hypothèse grâce à un nouveau modèle murin CRISPR/Cas9 invalidé pour SNORD115. Mes résultats montrent que la perte d'expression de SNORD115 ne perturbe pas la régulation post-transcriptionnelle du pré-ARNm 5-HT2C in vivo. D'autre part, des études réalisées dans l'équipe n'ont pas permis de révéler des anomalies marquées dans les phénotypes anxio-dépressifs, ni dans le comportement alimentaire. Ma thèse soulève donc des questions importantes quant au rôle régulateur de SNORD115 dans le cerveau et de sa contribution potentielle dans l'étiologie du SPW. En parallèle, j'ai aussi abordé le répertoire des 2'-O-méthylations de l'ARNr dans des tissus murins, notamment le cerveau. Ce travail s'inscrivait dans la thématique émergente de la théorie du "ribosome spécialisé" qui propose qu'une hétérogénéité structurale des composants du ribosome puisse se traduire par des changements dans les capacités fonctionnelles du ribosome. Mes résultats montrent des variations dans la méthylation pour un nombre très limité de sites, et ce principalement au cours du développement. Aussi, les ribosomes des tissus développementaux sont globalement moins méthylés que ceux des tissus adultes. Nous avons concentré nos efforts sur LSU-G4593 dont la méthylation guidée par SNORD78 est retrouvée uniquement au cours du développement. Nous proposons que des évènements d'épissage alternatif du gène-hôte de SNORD78 modulent la production de SNORD78, et de fait le niveau de méthylation LSU-Gm4593. Grâce à l'étude d'une lignée cellulaire humaine (HEK293) invalidée pour SNORD78, j'ai recherché les implications fonctionnelles de LSU-Gm4593. A ce jour, mes travaux ne montrent pas un rôle marqué dans la prolifération cellulaire, ni dans la fidélité de la traduction. La fonction précise de LSU-Gm4593 demeure donc incomprise
The nucleolus of mammalian cells contains hundreds of box C/D small nucleolar RNAs (SNORDs). Majority of them, guide sequence-specific 2'-O ribose methylations into ribosomal RNA (rRNA). Some of them facilitate RNA folding and cleavages of ribosomal RNA precursors or guide ribose methylations into spliceosomal small nuclear RNA U6. Recent studies propose that some SNORD could target other transcripts, possibly messenger RNA as suggested by the brain-specific SNORD115. SNORD115 is processed from tandemly repeated genes embedded in the imprinted SNURF-SNRPN domain. Defects in gene expression at this domain are causally linked to rare disease: the Prader-Willi Syndrome (PWS). Excitingly, SNORD115 displays an extensive region of complementary to a brain-specific mRNA encoding the serotonin receptor 5-HT2C. SNORD115 could influence 5-HT2C signaling by fine-tuning alternative splicing or A to I RNA editing of 5-HT2C pre-mRNA. Reduced 5-HT2C receptor activity could contribute to impaired emotional response and/or compulsive overeating that characterized the syndrome. My work was to test this hypothesis using a CRISPR/Cas9-mediated SNORD115 knockout mouse model. My results show that loss of SNORD115 expression, in vivo, does not alter the post-transcriptional regulation of 5-HT2C pre-mRNA processing. Others results from the team do not reveal any defects in anxio-depressive phenotypes and eating behaviour. Our study questions the regulatory roles of SNORD115 in brain functions and behavioural disturbance associated with PWS. On other hand, I have studied ribose methylation sites in rRNA from mouse tissues. This work was included in emerging field of the specialized ribosome hypothesis which suggests heterogeneity in ribosomes may impact activity of ribosomes. Our results show significant changes at few discrete set of sites, especially in rRNA from developing tissues. Also, rRNA from developing tissues is globally less methylated than rRNA from adult tissues. We focus on LSU-Gm4593 site because this position is specifically methylated only during development and hardly ever detected in adult tissues. Methylation at LSU-G4593 is guided by SNORD78. We propose that the expression levels of SNORD78 during development appeared to be regulated by alternative splicing of the host-gene and to correlate with the methylation level of its target site at LSU-G4593. We've used a human cell line (HEK293T) inactivated for the SNORD78 gene in order to understand the functionally role of the corresponding ribose methylation. Our work did not demonstrate any overt cellular phenotypes, even though translation fidelity and the precise function of LSU-Gm4593 remains unknown
2

Ringström, Saltin Markus. „Intrusion Detection Systems : utvärdering av Snort“. Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3081.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Det här examensarbetet undersöker effektiviteten hos ett Intrusion Detection System(IDS). Ett IDS är ett system som skall upptäcka om klienter på ett nätverk attackerasav en ”hacker” eller om någon obehörig försöker inkräkta, ungefär som en vakthund.Det IDS som testats är Snort, ett mycket populärt IDS skrivet med öppen källkod.Syftet med studien är att kunna påvisa huruvida ett IDS är ett bra komplement till ettsystems säkerhet eller inte, då det gjorts väldigt få metodiska undersökningar avSnort, och IDS i allmänhet.Den studie som gjorts utfördes med hjälp av ett antal experiment i enlaborationsmiljö, där effektiviteten hos Snort sattes på prov med hjälp av olika typerav attacker.Utifrån det resultat som uppkom så går det att konstatera att ett IDS absolut är ettkomplement värt att överväga för en organisation som är villig att ägna de resursersom systemet kräver, då ett högt antal av de utförda attackerna upptäcktes – attackersom anti-virus eller brandväggar inte är skapade för att reagera på.

3

Steinvall, Daniel. „Utvärdering av signaturdatabaser i systemet Snort“. Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72581.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Konstant uppkoppling till internet idag är en självklarhet för många världen över. Internet bidrar till en global förbindelse som aldrig tidigare varit möjligt, vilken kan tyckas vara underbart i många avseenden. Dessvärre kan denna digitala förbindelse missbrukas och användas för ondsinta ändamål vilket har lett till behov av säkerhetslösningar som bland annat nätverks-intrångsdetektionssystem. Ett av de mest omtalade verktygen som är ett exempel på ett sådant system är Snort som studeras i denna studie. Utöver analysering av Snort, evalueras även olika signaturdatabasers detektionsförmåga av angrepp. Totalt exekverades 1143 angrepp från 2008-2019 och dessa utvärderades av tre Snort-versioner daterade 2012, 2016 och 2018. Varje Snort-version analyserade angreppen med 18 signaturdatabaser daterade 2011-2019 från tre olika utgivare. Resultaten visar att det stor skillnad mellan de olika utgivarnas signaturdatabaser där den bästa detekterade runt 70% av angreppen medan den sämsta endast detekterade runt 1%. Även hur Snort konfigurerades hade stor inverkan på resultatet där Snort med för-processorn detekterade omkring 15% fler angrepp än utan den.
For many people all over the world being constantly connected to the Internet is taken for granted. The Internet connects people globally in a way that has never been possible before, which in many ways is a fantastic thing. Unfortunately, this global connection can be abused for malicious purposes which have led to the need for security solutions such as network intrusion detection systems. One prominent example of such a system is Snort which is the subject of evaluation in this thesis. This study investigates the ability of signature databases for Snort to detect cyberattacks. In total, we executed 1143 attacks released between 2008-2019 and recorded the network traffic. We then analyzed the network traffic using three versions of Snort released 2012, 2016, and 2018. For each version, we used 18 different signature databases dated 2011-2019 from three different publishers. Our results show that there are a significant difference between the different publishers’ signature databases, where the best signature database detected around 70% of the attacks and the worst only detected around 1%. The configuration of Snort also had a significant impact on the results, where Snort with the pre-processor detected about 15% more attacks than without it.
4

Magnusson, Jonas. „Intrångsdetekteringssystem : En jämförelse mellan Snort och Suricata“. Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4401.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Arbetets syfte är att jämföra intrångsdetekteringssystemen Snort och Suricata för att ge en uppfattning om vilken av applikationerna som lämpar sig att implementeras hos en internetleverantör för att upptäcka attacker och öka säkerheten på nätverket. Jämförelsen utförs med hänseende till antal upptäckta attacker, prestanda, implementeringstid, antal konfigurationsfiler samt vilka operativsystem de finns tillgängliga på.

Resultatet visar att Suricata med sitt stöd för att använda signaturer skapade för Snort upptäcker fler attacker än Snort. Snort däremot går både smidigare och snabbare att implementera. Prestandamässigt så visar Suricata bäst resultat, genom att använda sig av flera kärnor och mindre minne.

5

Fleming, Theodor, und Hjalmar Wilander. „Network Intrusion and Detection : An evaluation of SNORT“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). This system monitors the traffic sent to, from and within the network. This study investigates how a NIDS called SNORT with different configurations handles common network attacks. The knowledge of how SNORT managed the attacks is used to evaluate and indicate the vulnerability of different SNORT configurations. Different approaches on both how to bypass SNORT and how to detect attacks are described both theoretically, and practically with experiments. This study concludes that a carefully prepared configuration is the factor for SNORT to perform well in network intrusion detection.
6

Zhang, Huan. „Parallelization of a software based intrusion detection system - Snort“. Thesis, University of Canterbury. Electrical and Computer Engineering, 2011. http://hdl.handle.net/10092/5988.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Computer networks are already ubiquitous in people’s lives and work and network security is becoming a critical part. A simple firewall, which can only scan the bottom four OSI layers, cannot satisfy all security requirements. An intrusion detection system (IDS) with deep packet inspection, which can filter all seven OSI layers, is becoming necessary for more and more networks. However, the processing throughputs of the IDSs are far behind the current network speed. People have begun to improve the performance of the IDSs by implementing them on different hardware platforms, such as Field-Programmable Gate Array (FPGA) or some special network processors. Nevertheless, all of these options are either less flexible or more expensive to deploy. This research focuses on some possibilities of implementing a parallelized IDS on a general computer environment based on Snort, which is the most popular open-source IDS at the moment. In this thesis, some possible methods have been analyzed for the parallelization of the pattern-matching engine based on a multicore computer. However, owing to the small granularity of the network packets, the pattern-matching engine of Snort is unsuitable for parallelization. In addition, a pipelined structure of Snort has been implemented and analyzed. The universal packet capture API - LibPCAP has been modified for a new feature, which can capture a packet directly to an external buffer. Then, the performance of the pipelined Snort can have an improvement up to 60% on an Intel i7 multicore computer for jumbo frames. A primary limitation is on the memory bandwidth. With a higher bandwidth, the performance of the parallelization can be further improved.
7

Dominguez-Camara, Rosario. „Multiparameter assessment of speech using SNORS+ with integrated EMG analysis“. Thesis, University of Kent, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418555.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Albin, Eugene. „A comparative analysis of the Snort and Suricata intrusion-detection systems“. Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5480.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Approved for public release; distribution is unlimited.
Our research focuses on comparing the performance of two open-source intrusion-detection systems, Snort and Suricata, for detecting malicious activity on computer networks. Snort, the de-facto industry standard open-source solution, is a mature product that has been available for over a decade. Suricata, released two years ago, offers a new approach to signature-based intrusion detection and takes advantage of current technology such as process multithreading to improve processing speed. We ran each product on a multi-core computer and evaluated several hours of network traffic on the NPS backbone. We evaluated the speed, memory requirements, and accuracy of the detection engines in a variety of experiments. We conclude that Suricata will be able to handle larger volumes of traffic than Snort with similar accuracy, and thus recommend it for future needs at NPS since the Snort installation is approaching its bandwidth limits.
9

Kurukkankunnel, Joy Cyril, und Sherjin Dan Thomas. „A Study of Intrusion detection on PROFINET Network by Improving SNORT“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43350.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This report is a result of master thesis in network forensics at Halmstad University during spring term 2018. Industrial engineers are becoming aware of the importance of network security. In today's industrial system, attacks on industrial control system are becoming more commonplace. The availability of industrial specific search engine which can reveal system to anyone interested, has made it easier to target vulnerable systems. Years ago, the networks that are not connected to a public network were considered "Safe". Today these networks are inter-connected, and the challenge is how to make them secure. To protect industrial control systems, monitoring of the industrial network is required to find abnormal activities. There are many open source intrusion detection systems available we have chosen SNORT for our project work since SNORT is a powerful open source intrusion detection system and has many default sets of rules also communitybased rules can be implemented. SNORT has features such as real-time traffic analysis, logging packets and content searching ability. SNORT has limited capability in understanding the PROFINET protocol and the aim of our project is to modify SNORT application to read PROFINET packets so that it can be used in industrial networks running on PROFINET protocol and create rules for PROFINET by examining the data captured from the lab environment.
10

Meyer, Steven J. „GPS Receiver Testing on the Supersonic Naval Ordnance Research Track (SNORT)“. International Foundation for Telemetering, 1997. http://hdl.handle.net/10150/609808.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
International Telemetering Conference Proceedings / October 27-30, 1997 / Riviera Hotel and Convention Center, Las Vegas, Nevada
There is an interest in using Global Positioning System (GPS) receivers to find: Time Space Position Information (TSPI), miss distances between a missile and target, and using the data real time as an independent tracking aid for range safety. Ashtech, Inc. has several standalone GPS receivers they believe can work at high g levels. This paper investigates how the Ashtech GPS receivers work under high g loading in one axis. The telemetry system used to collect data from the receivers and the reconstruction of the data will also be discussed. The test was done at SNORT (Supersonic Naval Ordnance Research Track) located at NAWS, China Lake, CA. The g level obtained was about +23 g’s with a deceleration of -15 g’s. The velocity reached was about Mach 2.0. A summary of the errors is included.

Bücher zum Thema "SNORD":

1

Bendall-Brunello, John. Snore, dinosaur, snore! New York: Marshall Cavendish, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hansen, Cindy S. Snore-dom busters. Loveland, Colo: Group Pub., 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Williams, Rozanne Lanczak. The purple snerd. San Diego: Harcourt, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

L, Miller M. The enormous snore. New York, NY: Putnam's, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Scott, Charlie. Snort for dummies. Hoboken, NJ: Wiley Pub., 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Scott, Charlie. Snort For Dummies. New York: John Wiley & Sons, Ltd., 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Meister, Cari. Snorp the city monster =: Snorp el monstruo de la ciudad. Mankato, Minn: Capstone Stone Arch Books, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Meister, Cari. Snorp, the city monster. Minneapolis, Minn: Stone Arch Books, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Waber, Bernard. The mouse that snored. Boston: Houghton Mifflin, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Arnold, Marsha Diane. Roar of a snore. New York: Dial Books for Young Readers, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "SNORD":

1

O’Leary, Mike. „Snort“. In Cyber Operations, 947–82. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

O’Leary, Mike. „Snort“. In Cyber Operations, 605–41. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shahid, Azmeh, Kate Wilkinson, Shai Marcu und Colin M. Shapiro. „Snore Outcomes Survey (SOS)“. In STOP, THAT and One Hundred Other Sleep Scales, 359–61. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-9893-4_88.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Chi, Ruinan. „Intrusion Detection System Based on Snort“. In Lecture Notes in Electrical Engineering, 657–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40633-1_82.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

de Silva, Shaminda, Udantha R. Abeyratne, Asela S. Karunajeewa und Craig Hukins. „Effect of Background Sound and Impact of Snore Episode Length Normalization on Snore-Based Apnea Diagnosis“. In IFMBE Proceedings, 2311–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03882-2_614.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saganowski, Łukasz, Marcin Goncerzewicz und Tomasz Andrysiak. „Anomaly Detection Preprocessor for SNORT IDS System“. In Advances in Intelligent Systems and Computing, 225–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-32384-3_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Nishijima, Keisuke, Shingo Uenohara und Ken’ichi Furuya. „Evaluating Classification Methods in Snore Activity Detection“. In Advances in Intelligent Systems and Computing, 921–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93659-8_85.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mohanta, Abhijit, und Anoop Saldanha. „IDS/IPS and Snort/Suricata Rule Writing“. In Malware Analysis and Detection Engineering, 819–50. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

„Snore“. In Handbook of Disease Burdens and Quality of Life Measures, 4323. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-0-387-78665-0_6668.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Baker, Andrew R., Brian Caswell, Mike Poor, Stephen Northcutt, Raven Alder, Jacob Babbin, Jay Beale et al. „Installing Snort“. In Snort 2.1 Intrusion Detection, 99–164. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193183604-3/50008-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "SNORD":

1

Gupta, Shikha, Prerana Jha, Chitra Sarkar und Ritu Kulshreshtha. „Abstract 3482: SNORD-X in glioblastoma: regulation and functional analysis“. In Proceedings: AACR Annual Meeting 2017; April 1-5, 2017; Washington, DC. American Association for Cancer Research, 2017. http://dx.doi.org/10.1158/1538-7445.am2017-3482.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ankishan, Haydar, und A. Turgut Tuncer. „A new portable device for the snore/non-snore classification“. In 2017 International Conference on Engineering and Technology (ICET). IEEE, 2017. http://dx.doi.org/10.1109/icengtechnol.2017.8308212.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Azarbarzin, Ali, und Zahra Moussavi. „Unsupervised classification of respiratory sound signal into snore/no-snore classes“. In 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010). IEEE, 2010. http://dx.doi.org/10.1109/iembs.2010.5627650.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Howell, Richard M., Anthony D. Lucey und Peter W. Carpenter. „Instability of a Cantilevered Flexible Plate in Inviscid Channel Flow“. In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93941.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
A novel method for calculating the linear fluid-structure interaction of a cantilevered flexible plate centrally positioned in ideal channel flow, incorporating the effects of vorticity shed downstream, is described. When the channel walls are moved far apart, predictions of the critical velocity show good correlation with other published work. For the first time, detailed numerical investigation of the effect on this fluid-structure interaction of channel walls, a rigid central surface (upstream and adjacent to the flexible plate), unsteady mean flow and the variation of stiffness and damping properties along the flexible plate have been quantified. Of central importance is the application of the unsteady model to the investigation of the human snoring phenomenon. Further insight into the operation of two types of snore is made and a new type of snore is discovered that originates from the time-dependent effects of inhalation.
5

Khurat, Assadarat, und Wudhichart Sawangphol. „An Ontology for SNORT Rule“. In 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2019. http://dx.doi.org/10.1109/jcsse.2019.8864190.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Chakrabarti, S., M. Chakraborty und I. Mukhopadhyay. „Study of snort-based IDS“. In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1741914.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fang, Xianjin, und Lingbing Liu. „Integrating Artificial Intelligence into Snort IDS“. In 2011 3rd International Workshop on Intelligent Systems and Applications (ISA). IEEE, 2011. http://dx.doi.org/10.1109/isa.2011.5873435.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Tung Tran, I. Aib, E. Al-Shaer und R. Boutaba. „An evasive attack on SNORT flowbits“. In 2012 IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). IEEE, 2012. http://dx.doi.org/10.1109/noms.2012.6211918.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nishijima, Keisuke, Shingo Uenohara und Ken'ichi Furuya. „Snore activity detection using smartphone sensors“. In 2015 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2015. http://dx.doi.org/10.1109/icce-tw.2015.7216814.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Al-Mamory, S. O., A. Hamid, A. Abdul-Razak und Z. Falah. „String matching enhancement for snort IDS“. In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711211.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Zur Bibliographie