Littérature scientifique sur le sujet « IDS IMPLEMENTATION »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « IDS IMPLEMENTATION ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "IDS IMPLEMENTATION"
Tarkhan, Mahdi, Saeed Bagheri Shouraki et Seyed Hossein Khasteh. « A novel hardware implementation of IDS method ». IEICE Electronics Express 6, no 23 (2009) : 1626–30. http://dx.doi.org/10.1587/elex.6.1626.
Texte intégralPaul, Morgan. « Looking to the Future ». Pathfinder : A Canadian Journal for Information Science Students and Early Career Professionals 4, no 1 (8 septembre 2023) : 54–67. http://dx.doi.org/10.29173/pathfinder71.
Texte intégralMizutani, Masayoshi, Shin Shirahata, Masaki Minami et Jun Murai. « The design and implementation of session-based IDS ». Electronics and Communications in Japan (Part I : Communications) 89, no 3 (mars 2006) : 46–58. http://dx.doi.org/10.1002/ecja.20251.
Texte intégralBush-Mecenas, Susan, Julie A. Marsh et Katharine O. Strunk. « Guiding Principals : Middle-Manager Coaching and Human-Capital Reform ». Teachers College Record : The Voice of Scholarship in Education 122, no 10 (octobre 2020) : 1–50. http://dx.doi.org/10.1177/016146812012201004.
Texte intégralMerrikh-Bayat, Farnood, Saeed Bagheri Shouraki et Ali Rohani. « Memristor Crossbar-Based Hardware Implementation of the IDS Method ». IEEE Transactions on Fuzzy Systems 19, no 6 (décembre 2011) : 1083–96. http://dx.doi.org/10.1109/tfuzz.2011.2160024.
Texte intégralBen Charhi, Youssef, Nada Mannane, Elmahdi Bendriss et Regragui Boubker. « Behavioral Analysis Approach for Likelihood Determination in Cloud IDS : Implementation Architecture ». International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no 1 (janvier 2018) : 36–57. http://dx.doi.org/10.4018/ijmdwtfe.2018010103.
Texte intégralBouchet, Flavien, Vincent Le Moing, Delphine Dirand, François Cros, Alexi Lienard, Jacques Reynes, Laurent Giraudon et David Morquin. « Effectiveness and Acceptance of Multimodal Antibiotic Stewardship Program : Considering Progressive Implementation and Complementary Strategies ». Antibiotics 9, no 12 (27 novembre 2020) : 848. http://dx.doi.org/10.3390/antibiotics9120848.
Texte intégralMahesh T R, V Vivek et Vinoth Kumar. « Implementation of Machine Learning-Based Data Mining Techniques for IDS ». International Journal of Information Technology, Research and Applications 2, no 1 (31 mars 2023) : 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.
Texte intégralKim, Song-Mok, et Seungyoung Park. « Real-Time Implementation of Bi-directional GPT-based CAN IDS Using Jetson Nano ». Journal of Digital Contents Society 24, no 11 (30 novembre 2023) : 2871–79. http://dx.doi.org/10.9728/dcs.2023.24.11.2871.
Texte intégralSilva, Rui Filipe, Raul Barbosa et Jorge Bernardino. « Intrusion Detection Systems for Mitigating SQL Injection Attacks ». International Journal of Information Security and Privacy 14, no 2 (avril 2020) : 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Texte intégralThèses sur le sujet "IDS IMPLEMENTATION"
Fors, Markus, et Christian Grahn. « An implementation of a DNS-based malware detection system ». Thesis, Karlstad University, Karlstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6036.
Texte intégralToday’s wide usage of the Internet makes malicious software (malware) and botnets a big problem. While anti-virus software is commonplace today, malware is constantly evolving to remain undetected. Passively monitoring DNS traffic on a network can present a platform for detecting malware on multiple computers at a low cost and low complexity. To explore this avenue for detecting malware we decided it was necessary to design an extensible system where the framework was separate from the actual detection methods. We wanted to divide the system into three parts, one for logging, one for handling modules for detection and one for taking action against suspect traffic. The system we implemented in C collects DNS traffic and processes it with modules that are compiled separately and can be plugged in or out during runtime. Two proof of concept modules have been implemented. One based on a blacklist and one based on geolocation of requested servers. The system is complete to the point of being ready for field testing and implementation of more advanced detection modules.
Tong, Jizhou. « Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid ». University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.
Texte intégralNykvist, Carl, et Martin Larsson. « Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple ». Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157481.
Texte intégralFu, Yulong. « Sécurité Vérification d’implémentation de protocole ». Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3003/document.
Texte intégralRegarding the development of computer technologies, computer systems have been deeply used in our daily life. Those systems have become the foundation of our modern information society. Some of them even take responsibilities for many essential and sensitive tasks (e.g., Medical Treatment System, E-Commerce, Airplane System, Spaceship System, etc.). Once those systems are executed with problems, the loss on the economy may reach an unacceptable number. In order to avoid these disappointing situations, the security of the current systems needs to be verified before their installations. While, most of the systems are implemented from protocol specifications, the problems of verifying the security of concrete system can be transformed to verify the security of protocol implementation. In this thesis, we focus on the security verification methods of protocol implementations and we are interested with two main types of network attacks: Denis-of-Services (DoS) attacks and Protocol Authentication attacks. We investigate the features of these attacks and the existed formal verification methods and propose two extended models of IOLTS and the corresponding algorithms to generate the security verification test cases automatically. In order to avoid the possible state explosions, we also formalize the security experiences of the tester as Security Objective to control the test generation on-the-fly. Meanwhile, a modeled based Anomaly Intrusion Detection Systems (IDS) analysis method is also proposed in this thesis, which can enhance the detect abilities of Anomaly IDS. These proposed verification methods are demonstrated with the case study of RADIUS protocol and an integrated GUI tool is also proposed to simply the operations of test generation
Olsson, Jenny, Veronica Karlsson et Maria Muravskaya. « Swedbank's implementation process of IFRS ». Thesis, Jönköping University, JIBS, Business Administration, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-895.
Texte intégralSammanfattning
Bakgrund: En ökad handel över nationsgränserna har skapat en efterfrågan på ett internationellt redovisningsspråk. IASB har därför skapat ett set med högkvalitativa internationella redovisningsstandarder. Från och med 2005 kräver EU att alla företag som är listade på en reglerad marknad inom EU ska an-vända sig av IASBs standarder IFRS.
Problem: Genomförandet av implementeringen av IFRS är olika i olika företag. Vi vill därför undersöka hur implementeringsprocessen var genomförd i Sveriges största bank, Swedbank.
Syfte: Syftet med den här rapporten är att beskriva samt förklara hur förändringen till IFRS genomfördes i Swedbank samt att beskriva de eventuella problem och hinder som implementeringen av dessa standarder kan ha medfört.
Metod: Vi har valt att göra en fallstudie genom att intervjua anställda i Swedbank som har varit delaktiga i implementeringsprocessen. Vi har också intervjuat Deloitte för att få deras syn på en implementeringsprocess av IFRS.
Analys: Vår analys är baserad på empirisk data i jämförelse med ett teoretiskt underlag. Vad vi har kommit fram till är att Swedbank har inkluderat de flesta av de steg som tas upp i teorin angående en implementering av IFRS; de har förberett sig bra samt använt rätt resurser. De har dock avvikit genom att inte utvärdera processen när den var klar.
Slutsats: Swedbank satte ihop en central projekt grupp som skötte implementering-en. De identifierade de ändringar som skulle göras och genomförde dessa. De problem som uppstod i processen har sitt ursprung i FVO och IAS 39.
Abstract
Background: An increase in cross-border trade has created a need for a common international accounting language. IASB therefore created a single set of high quality international accounting standards. As of 2005 all companies listed on a regulated market within the EU are mandated to use IASB’s standard IFRSs.
Problem: The process of implementing IFRS is different in different companies. We therefore want to look at the implementation process in Swedbank, the largest bank in Sweden.
Purpose: The purpose of this study is to describe and explain how the process of the change to IFRSs was done within Swedbank and to outline the problems and obstacles that might have occurred when implementing these new standards.
Method: We have done a case study by interviewing people in Swedbank that took part in the implementation process. We have also done an interview with Deloitte to get their views on a IFRSs implementation process.
Analysis: Our analysis is based on our empirical findings in comparison with our theoretical framework. We found that Swedbank did most of the steps described in the theoretical framework regarding the implementation process; they prepared themselves well and choose the right resources to do so. The deviating step is that no evaluation was done afterwards.
Conclusion: Swedbank used a project group to handle the implementation process. They identified the changes that had to be done and did the change to IFRS. The problems and obstacles that occurred were due to FVO and IAS 39.
Vidal, Sandoval Jesus Enrique. « Implicit IDA-PBC Design and Implementation for a Portal Crane System ». Master's thesis, Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15353.
Texte intégralInterconnection and damping assignment passivity-based control (IDA-PBC) ist eine wohlbekannte Methode zur Regelung von nichtlinearen Systemen, die im geschlossenen Regelkreis eine gewünschte Port-Hamiltonian-Struktur (pH) haben. Die Anwendung auf unteraktuierte mechanische Systeme (UMS) erfordert die Erfüllung von sogenannten Matching Conditions, die meistens die Lösung partieller Differentialgleichungen (PDE) benötigt. Erst kürzlich wurde die IDA-PBC auf implizit modellierte UMS erweitert, bei denen die Systemdynamik in pH-Darstellungen durch Differentialalgebraische Gleichungen (DAE) beschrieben wird. Dieser implizite Ansatz ermöglicht bei einigen Systemklassen, das PDE-Problem zu umgehen und auch eine Ausgangsrückführung zu entwerfen. Die vorliegende Masterarbeit beschäftigt sich mit dem Entwurf und der Implementierung des impliziten IDA-PBC zur Gesamtenergievorgabe auf einem Portalkransystem im Labor des Fachgebiets Regelungstechnik der TU-Ilmenau. Der implizite Regler wird mit einem vereinfachten (expliziten) IDA-PBC verglichen [1]. Dieser Algorithmus gibt ebenso die Gesamtenergie vor und vermeidet das PDE-Problem. In der Masterarbeit wird in diesem Algorithmus ein wesentlicher Implementierungsfehler offengelegt und behoben.
Tesis
Aronsson, Robert, et Martin Högberg. « IAS 40 : The effects of the implementation of IAS 40 for listed investment property companies within the European Union ». Thesis, Jönköping University, JIBS, Accounting and Finance, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7767.
Texte intégralBackground: The increased globalization and trade over domestic borders within the European Union (EU) has lead to the implementation of new international accounting standards. This is necessary to create an effective capital market, where comparisons between companies located in different countries can be made, due to a more harmonized accounting. Obstacles to overcome when establish a more harmonized accounting in the EU is for example different accounting backgrounds and valuation methods.
Purpose: The purpose of the thesis is to as far possible study whether the establishment of IAS 40 contributes to an increased harmonization and more comparable accounting of investment property for listed companies within the EU.
Method: This thesis involves both a quantitative –and a qualitative research method. We have used primary data in forms of interviews, and secondary data in forms of annual reports, regulations, literature and articles in the thesis. Using both primary –and secondary data results in a higher reliability and validity.
Frame of reference: There are two alternative valuations methods according to IAS 40, the cost –and the fair value model. The cost model means a valuation to historical cost minus depreciation. Valuation in compliance to the fair value model on the other hand means that the investment property shall be valuated to market value. When using the cost model a note of the fair value shall be included in the financial statement. A company has according to IAS 40 the possibility to choose between internal –or external valuation when estimating the fair value.
Empirical results and analysis: Our empirical result is presented mainly through annual reports from listed investment property companies in Sweden, England and Germany. We found that the fair value model was used by all the analysed companies in Sweden and England in 2005, the year of the implementation of IAS 40 in the EU. By analysing the annul reports from the investment property companies we found indications that the fair value model also tends to become the generally excepted valuation model in Germany. Furthermore, our empirical result shows that a majority of the Swedish investment property companies regularly used internal valuation, but there is a pattern of external valuation as a complement to the internal valuation. In England and Germany all investment property companies used external valuation and there was no use of internal valuation even as a complement to the external valuation.
Conclusions: Based on our empirical results we draw the conclusion that the accounting for listed investment property companies within the EU is more harmonized and comparable today than before the implementation of IAS 40 in 2005. However, IAS 40 gives the companies the possibility to decide weather to use the cost –or the fair value model and the use of external valuation is optional. This can be viewed as obstacles to achieve a total harmonization of the accounting within the EU for listed investment property companies. From our empirical findings we draw the conclusion that the fair value model tends to become the generally excepted valuation model within the EU. Also, we do not perceive the use of the cost model as a barrier to the harmonization process because the fair value still has to be left in a not in the financial statement. However, we believe that in order to achieve a more harmonized and more comparable accounting for listed investment property companies within in the EU a directive about a minimum of external valuation must be included in IAS 40. This in order to avoid companies to use only internal valuation of the properties as this may effect the result.
ABDULLAEV, ZAFAR. « The IAS 41 "Agriculture" and Accounting Regulatory Policies in Uzbekistan, Possible Implementation ». Doctoral thesis, Università degli studi di Genova, 2018. http://hdl.handle.net/11567/930835.
Texte intégralGörgin, Robert, et Sergejs Gogolis. « Implementation of IAS 36 by Swedish Banks : Interest Rate Swaps in Hedging Applications ». Thesis, Jönköping University, JIBS, Business Administration, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Texte intégralIn 2005, all groups listed on European stock exchanges are required to prepare their consolidated financial statements according to International Financial Reporting Standards (IFRS). IFRS are different from local regulations across Europe in many aspects, and observers expect the transition process thorny and resource-draining for the companies that undertake it.
The study explores transition difficulties by Swedish bank groups on the way of implementing IAS 39, Financial Instruments: Recognition and Measurement. Deemed the most controversial and challenging standard for adoption by the financial sector, it indeed poses new demandson classification, recognition and measurment of financial instruments, and sets out new hedge accounting rules, previously unseen in Swedish practice. Additionaly, the structure of bank's balance sheets makes IAS 39 also the central one among all other standards in terms of numbers of balance sheet items it impacts.
The study uses qualitative method to explore whether transition to IAS 39 is likely to improve transparency in reporting derivatives. Focus is on use of interest rate swaps as hedging instruments in mitigation of interest rate risk.
It is concluded that differences between two reporting frameworks have been well understood by the banks early in the implementation process. A negative feature of the standard is increased volatility in earnings as a result of more wide-spread reliance on fair value measurement method. This accounting volatility impedes comparability of performance results, as well as conceals true efficiency of economic hedge relationships. To some degree, the volatility can be minimized by the application of hedge accounting. However, a bank must methodically follow a set of rigourous if hegde accounting is to be adopted. Fair value is a more straightforward alternative to hedge accounting , but it brings in additional concerns, and has not yet been endorsed in the EU.
It is additionally argued that recognition of all derivatives on BS and measurement at fair value are two important features of IAS 39 that indeed increases reporting transparency by minimizing risk of undisclosed hidden losses.
Görgin, Robert, et Sergejs Gogolis. « Implementation of IAS 39 by Swedish Banks : Interest Rate Swaps in Hedging Applications ». Thesis, Jönköping University, IHH, Företagsekonomi, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-119.
Texte intégralLivres sur le sujet "IDS IMPLEMENTATION"
R, Nestor John, dir. IDL : The language and its implementation. Englewood Cliffs, N.J : Prentice Hall, 1989.
Trouver le texte intégralR, Nestor John, dir. IDL : The language and its implementation. Englewood Cliffs, N.J : Prentice Hall, 1990.
Trouver le texte intégralMcElreath, T. Jack. IMS design & implementation techniques. 2e éd. Wellesley, Mass : QED Information Sciences, 1990.
Trouver le texte intégralInternational Business Machines Corporation. International Technical Support Organization, dir. IBM IMS version 10 implementation guide : A technical overview. [Poughkeepsie, NY] : IBM, International Technical Support Organization, 2007.
Trouver le texte intégralBahgat, Ahmad. International accounting standards--IAS 39 accounting for financial instruments : Implementation issues and decision-making dilemma. Abidjan, Côte d'Ivoire : African Development Bank, 2002.
Trouver le texte intégralLipski, Stanislav, Aleksandr Sizov et Yuriy Cypkin. Implementation of cadastral relations. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1866814.
Texte intégralPolischuk, Yuriy, et Aleksandr Borovskiy. Databases and their security. ru : INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Texte intégralWorld Bank. Africa--South Central & Indian Ocean Department. Human Development 1. Implementation completion report (IDA-31360) on a credit in the amount of US$66 million to the Republic of Malawi for a second social action fund project. Washington, D.C?] : Human Development 1, Country Dept. 3, Africa Region, 2004.
Trouver le texte intégralMironova, Svetlana. The doctrine of the financial and legal status of municipalities in the Russian Federation and its implementation. ru : INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1819040.
Texte intégralAndrichenko, Lyudmila, A. Postnikov, L. Vasil'eva, Zh Gaunova, E. Nikitina et Inna Plyugina. Reform of the organization of public power : the main directions of implementation. ru : INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1839416.
Texte intégralChapitres de livres sur le sujet "IDS IMPLEMENTATION"
Prinz, Wolfgang, Thomas Rose et Nils Urbach. « Blockchain Technology and International Data Spaces ». Dans Designing Data Spaces, 165–80. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_10.
Texte intégralJingang, Li, Liu Shibin et Liu Wei. « The Design and Implementation of the IDS Catalogue Data Archive System ». Dans Advances in Intelligent and Soft Computing, 837–44. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27334-6_99.
Texte intégralPampus, Julia, Brian-Frederik Jahnke et Ronja Quensel. « Evolving Data Space Technologies : Lessons Learned from an IDS Connector Reference Implementation ». Dans Lecture Notes in Computer Science, 366–81. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_27.
Texte intégralO’Brien, Martin A., David Mohally, Götz P. Brasche et Andrea G. Sanfilippo. « Huawei and International Data Spaces ». Dans Designing Data Spaces, 451–69. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_27.
Texte intégralRaja, K., et M. Lilly Florence. « Implementation of IDS Within a Crew Using ID3Algorithm in Wireless Sensor Local Area Network ». Dans Inventive Computation Technologies, 467–75. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_52.
Texte intégralPriyalakshmi, V., et R. Devi. « Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS ». Dans Proceedings of International Conference on Data Science and Applications, 51–70. Singapore : Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_5.
Texte intégralWadiai, Younes, Yousef El Mourabit et Mohammed Baslam. « Machine Learning for Intrusion Detection : Design and Implementation of an IDS Based on Artificial Neural Network ». Dans Advances in Intelligent Systems and Computing, 206–16. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73603-3_19.
Texte intégralMehrotra, Latika, Prashant Sahai Saxena et Nitika Vats Doohan. « Implementation of Modified ID3 Algorithm ». Dans Information and Communication Technology for Sustainable Development, 55–60. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3932-4_6.
Texte intégralElliott, Kim S. « Industrial Building Systems (IBS) Project Implementation ». Dans Modernisation, Mechanisation and Industrialisation of Concrete Structures, 61–124. Chichester, UK : John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118876503.ch2.
Texte intégralJeong, Eunseon, Junyoung Park, Minseong Kim, Chanmin Kim, Soyoung Jung et Kangbin Yim. « ICS Testbed Implementation Considering Dataset Collection Environment ». Dans Lecture Notes in Networks and Systems, 397–406. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61108-8_39.
Texte intégralActes de conférences sur le sujet "IDS IMPLEMENTATION"
Varanasi, Venkata Ramani, et Shaik Razia. « CNN Implementation for IDS ». Dans 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725426.
Texte intégralMofidi, Farhad, Sena Hounsinou et Gedare Bloom. « L-IDS : A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks ». Dans IoTDI '23 : International Conference on Internet-of-Things Design and Implementation. New York, NY, USA : ACM, 2023. http://dx.doi.org/10.1145/3576842.3589170.
Texte intégralSharma, Anshu, et Monika Sharma. « Analysis and implementation of BRO IDS using signature script ». Dans 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489563.
Texte intégralElhak, Messaoud Dhia, Zitouni Abdelkader, Djezzar Boualem, Benabdelmoumene Abdelmadjid et Zatout Boumediene. « Fast Ids – Vgs Technique Implementation for NBTI Characterization ». Dans 2020 International Conference on Electrical Engineering (ICEE). IEEE, 2020. http://dx.doi.org/10.1109/icee49691.2020.9249809.
Texte intégralMohamed, Yasir Abdelgadir, et Azween B. Abdullah. « Implementation of IDS with response for securing MANETs ». Dans 2010 International Symposium on Information Technology (ITSim 2010). IEEE, 2010. http://dx.doi.org/10.1109/itsim.2010.5561608.
Texte intégralSaheed, Y. K., R. D. Magaji, A. Tosho et O. B. Longe,. « Adopting Machine Learning Blockchain Intrusion Detection for Protecting Attacks on Internet of Things ». Dans 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p30.
Texte intégralShrivastava, Utpal, et Neelam Sharma. « Feature Selection and Implementation of IDS using Boosting algorithm ». Dans 2020 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2020. http://dx.doi.org/10.1109/compe49325.2020.9200072.
Texte intégral« ANALYSIS, DESIGN AND IMPLEMENTATION OF IDS USING DATA MINING ». Dans 4th International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001516100810086.
Texte intégralMa, Fang, Mingyi Duan et Yajun Yang. « The research and implementation of an improved IPv6 IDS ». Dans International Conference on Electrical and Electronics Engineering. Southampton, UK : WIT Press, 2014. http://dx.doi.org/10.2495/iceee140061.
Texte intégralVaid, Chetna, et Harsh K. Verma. « Anomaly-based IDS implementation in cloud environment using BOAT algorithm ». Dans 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). IEEE, 2014. http://dx.doi.org/10.1109/icrito.2014.7014762.
Texte intégralRapports d'organisations sur le sujet "IDS IMPLEMENTATION"
Michelitsch, Roland, Odette Maciel, Claudia Figueroa, Regina Legarreta, Melanie Putic et Alejandro Ahumada. Management’s Implementation of OVE Recommendations : IDB Group’s Evaluation Recommendation Tracking System. Inter-American Development Bank, juillet 2019. http://dx.doi.org/10.18235/0002182.
Texte intégralPrince, Zachary M., Jean C. Ragusa et Yaqi Wang. Improved Quasi-Static Method : IQS Method Implementation for CFEM Diffusion in Rattlesnake. Office of Scientific and Technical Information (OSTI), février 2016. http://dx.doi.org/10.2172/1261241.
Texte intégralFrost, Sandra, Nigel Lawrence et William Humbert. Implementation and Demonstration of P4 Software for Improving ICS Protocol Visibility and Control. Office of Scientific and Technical Information (OSTI), janvier 2023. http://dx.doi.org/10.2172/1909544.
Texte intégralSembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa et al. Approach Paper : Evaluation of IDB Invest. Inter-American Development Bank, septembre 2022. http://dx.doi.org/10.18235/0004463.
Texte intégralSembler, Jose Ignacio, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, Diego Del Pilar et al. Corporate Evaluation : Evaluation of IDB Invest. Inter-American Development Bank, juillet 2023. http://dx.doi.org/10.18235/0005014.
Texte intégralBouillon, César P., Maria Fernanda Rodrigo, Michelle Infanzón, Henry Dyer et Sumiko Andrade Sakaguchi. Approach Paper : IDB Support to Strengthen Public Sector Transparency and Integrity in Latin America and the Caribbean. Inter-American Development Bank, avril 2021. http://dx.doi.org/10.18235/0003248.
Texte intégralLi, Meng Hua, dir. Smart Manufacturing : National Implementation Framework. Asian Productivity Organization, mars 2022. http://dx.doi.org/10.61145/getj1519.
Texte intégralJahromi, Maryam Eslami, et Haleh Ayatollahi. Utilization of telehealth to manage the Covid-19 pandemic in low and middle income countries : a scoping review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, août 2022. http://dx.doi.org/10.37766/inplasy2022.8.0004.
Texte intégralSharples, Jonathan, Dan Bristow, Emma Taylor-Collins et Eleanor McKillop. What Works Network Implementation Project. Wales Centre for Public Policy - Cardiff University, avril 2022. http://dx.doi.org/10.54454/20220411.
Texte intégralTokarieva, Anastasiia V., Nataliia P. Volkova, Inesa V. Harkusha et Vladimir N. Soloviev. Educational digital games : models and implementation. [б. в.], septembre 2019. http://dx.doi.org/10.31812/123456789/3242.
Texte intégral