Добірка наукової літератури з теми "SNORD"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SNORD".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "SNORD":

1

Cohen, Eran, Dana Avrahami, Kati Frid, Tamar Canello, Ephrat Levy Lahad, Sharon Zeligson, Shira Perlberg, et al. "Snord 3A: A Molecular Marker and Modulator of Prion Disease Progression." PLoS ONE 8, no. 1 (January 21, 2013): e54433. http://dx.doi.org/10.1371/journal.pone.0054433.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kishore, Shivendra, Amit Khanna, Zhaiyi Zhang, Jingyi Hui, Piotr J. Balwierz, Mihaela Stefan, Carol Beach, Robert D. Nicholls, Mihaela Zavolan, and Stefan Stamm. "The snoRNA MBII-52 (SNORD 115) is processed into smaller RNAs and regulates alternative splicing." Human Molecular Genetics 19, no. 7 (January 6, 2010): 1153–64. http://dx.doi.org/10.1093/hmg/ddp585.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ho, Shuk-Mei, Ana Cheong, Hung-Ming Lam, Wen-Yang Hu, Guang-Bin Shi, Xuegong Zhu, Jing Chen, et al. "Exposure of Human Prostaspheres to Bisphenol A Epigenetically Regulates SNORD Family Noncoding RNAs via Histone Modification." Endocrinology 156, no. 11 (August 6, 2015): 3984–95. http://dx.doi.org/10.1210/en.2015-1067.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Askarian-Amiri, M. E., J. Crawford, J. D. French, C. E. Smart, M. A. Smith, M. B. Clark, K. Ru, et al. "SNORD-host RNA Zfas1 is a regulator of mammary development and a potential marker for breast cancer." RNA 17, no. 5 (April 1, 2011): 878–91. http://dx.doi.org/10.1261/rna.2528811.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Shaw, P. J., A. F. Beven, D. J. Leader, and J. W. Brown. "Localization and processing from a polycistronic precursor of novel snoRNAs in maize." Journal of Cell Science 111, no. 15 (August 1, 1998): 2121–28. http://dx.doi.org/10.1242/jcs.111.15.2121.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We have shown previously that groups of U14 snoRNA genes are clustered with other, novel snoRNAs in maize. These genes are transcribed polycistronically from an upstream promoter to give a precursor snoRNA, which is processed by a splicing-independent mechanism. The clusters contain both box C/D snoRNAs, thought to guide rRNA O-ribose methylations, and the first plant box H/ACA snoRNA so far identified, thought to guide an rRNA pseudo-uridylation. Here we show that four novel snoRNAs identified as members of U14-containing gene clusters each show distinct sub-nucleolar localizations. Two of the snoRNAs (snoR2, a box H/ACA snoRNA, and snoR3, a box C/D snoRNA) colocalise closely with nucleolar rDNA transcription sites. A third box C/D snoRNA, U49, is localised to a more extended region which includes the transcription sites. On the other hand snoR1, another box C/D snoRNA, is located in a quite different region of the nucleolus, and shows a similar distribution to that of 7–2/MRP, a snoRNA involved in the later pre-rRNA cleavage reactions. This may indicate that this snoRNA is involved at later stages of processing, whereas the other snoRNAs are involved early or cotranscriptionally. Probes to intergenic spacer regions of the precursor snoRNA have been used to determine the location of the precursor. This shows a clear labelling of both the dense fibrillar component of the nucleolus, and of coiled bodies. This distribution implies that the polycistronic precursor is imported into the nucleolus for processing to the mature snoRNAs, and that the import or processing pathway involves coiled bodies.
6

Akhtari, Farida S., Tammy M. Havener, Masahide Fukudo, John R. Jack, Howard L. McLeod, Tim Wiltshire, and Alison A. Motsinger-Reif. "The influence of Neanderthal alleles on cytotoxic response." PeerJ 6 (October 23, 2018): e5691. http://dx.doi.org/10.7717/peerj.5691.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Various studies have shown that people of Eurasian origin contain traces of DNA inherited from interbreeding with Neanderthals. Recent studies have demonstrated that these Neanderthal variants influence a range of clinically important traits and diseases. Thus, understanding the genetic factors responsible for the variability in individual response to drug or chemical exposure is a key goal of pharmacogenomics and toxicogenomics, as dose responses are clinically and epidemiologically important traits. It is well established that ethnic and racial differences are important in dose response traits, but to our knowledge the influence of Neanderthal ancestry on response to xenobiotics is unknown. Towards this aim, we examined if Neanderthal ancestry plays a role in cytotoxic response to anti-cancer drugs and toxic environmental chemicals. We identified common Neanderthal variants in lymphoblastoid cell lines (LCLs) derived from the globally diverse 1000 Genomes Project and Caucasian cell lines from the Children’s Hospital of Oakland Research Institute. We analyzed the effects of these Neanderthal alleles on cytotoxic response to 29 anti-cancer drugs and 179 environmental chemicals at varying concentrations using genome-wide data. We identified and replicated single nucleotide polymorphisms (SNPs) from these association results, including a SNP in the SNORD-113 cluster. Our results also show that the Neanderthal alleles cumulatively lead to increased sensitivity to both the anti-cancer drugs and the environmental chemicals. Our results demonstrate the influence of Neanderthal ancestry-informative markers on cytotoxic response. These results could be important in identifying biomarkers for personalized medicine or in dissecting the underlying etiology of dose response traits.
7

Salminen, Iiro Ilmari, Bernard J. Crespi, and Mikael Mokkonen. "Baby food and bedtime: Evidence for opposite phenotypes from different genetic and epigenetic alterations in Prader-Willi and Angelman syndromes." SAGE Open Medicine 7 (January 2019): 205031211882358. http://dx.doi.org/10.1177/2050312118823585.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Prader–Willi and Angelman syndromes are often referred to as a sister pair of neurodevelopmental disorders, resulting from different genetic and epigenetic alterations to the same chromosomal region, 15q11-q13. Some of the primary phenotypes of the two syndromes have been suggested to be opposite to one another, but this hypothesis has yet to be tested comprehensively, and it remains unclear how opposite effects could be produced by changes to different genes in one syndrome compared to the other. We evaluated the evidence for opposite effects on sleep and eating phenotypes in Prader–Willi syndrome and Angelman syndrome, and developed physiological–genetic models that represent hypothesized causes of these differences. Sleep latency shows opposite deviations from controls in Prader–Willi and Angelman syndromes, with shorter latency in Prader–Willi syndrome by meta-analysis and longer latency in Angelman syndrome from previous studies. These differences can be accounted for by the effects of variable gene dosages of UBE3A and MAGEL2, interacting with clock genes, and leading to acceleration (in Prader–Willi syndrome) or deceleration (in Angelman syndrome) of circadian rhythms. Prader–Willi and Angelman syndromes also show evidence of opposite alterations in hyperphagic food selectivity, with more paternally biased subtypes of Angelman syndrome apparently involving increased preference for complementary foods (“baby foods”); hedonic reward from eating may also be increased in Angelman syndrome and decreased in Prader–Willi syndrome. These differences can be explained in part under a model whereby hyperphagia and food selectivity are mediated by the effects of the genes SNORD-116, UBE3A and MAGEL2, with outcomes depending upon the genotypic cause of Angelman syndrome. The diametric variation observed in sleep and eating phenotypes in Prader–Willi and Angelman syndromes is consistent with predictions from the kinship theory of imprinting, reflecting extremes of higher resource demand in Angelman syndrome and lower demand in Prader–Willi syndrome, with a special emphasis on social–attentional demands and attachment associated with bedtime, and feeding demands associated with mother-provided complementary foods compared to offspring-foraged family-type foods.
8

Supriyatno, Bambang, Rusmala Deviani, Alan R. Tumbelaka, Evita KB Ifran, and Nastiti N. Rahajoe. "Characteristics and risk factors of snoring and the prevalence of suspected obstructive sleep apnea in children." Paediatrica Indonesiana 45, no. 1 (October 10, 2016): 40. http://dx.doi.org/10.14238/pi45.1.2005.40-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background Snoring as a consequence of upper airway obstruc-tion is common in children. Snoring can be considered as normal,but might also reflect a disease such as obstructive sleep apnea(OSA), which is associated with serious morbidities. In Indonesia,data on the characteristics and risk factors of snoring and obstruc-tive sleep apnea is limitedObjectives The aims of this study were to find out the character-istics and risk factors of snoring in children and to determine theprevalence of suspected OSA in snoring children.Methods A cross-sectional study was carried out on children aged5-13 years using parental questionnaires scored according to theBrouilette formula. All children underwent physical examination forweight, height and tonsil size. Adenoid radiology was performedon part of the samples.Results Of the 917 questionnaires distributed, only 658 were com-pleted. The ratio of boys to girls was equal. Obesity was detectedin 18.3% of children, among whom 54.2% snored. Obese childrenwere 2.1 times more likely to snore. Besides obesity, rhinitis andatopy were found to be associated with snoring (PR= , 95%CI ;and PR= , 95%CI ; respectively). Asthma and tonsil hypertrophywere shown not to be predisposing factors of snoring. Childrenwith adenoid hypertrophy were 1.8 times more likely to snore ha-bitually. The prevalence of snoring and suspected OSA in childrenaged 5-13 years were 31.6% and 5.9%, respectively.Conclusion Risk factors of snoring were obesity, adenoid hyper-trophy, atopy and rhinitis. Prevalence of snoring in children age 5-13 years was 31.6% and that of suspected OSA cases was 5.9%.
9

Sabekti, Muhamad Agung. "Pembuatan Web Interface Snort untuk Managemen Firewall dengan Operasi CRUD (Create, Read, Update, Delete) pada File System Snort dan Pengujian Web dengan Serangan serta Notifikasi pada Email dan Telegram." Indonesian Journal of Applied Informatics 3, no. 2 (August 4, 2019): 74. http://dx.doi.org/10.20961/ijai.v3i2.27836.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p><em>Snort</em> merupakan salah satu aplikasi <em>firewall</em> yang dikonfigurasi dalam terminal linux, meliputi konfigurasi <em>snort</em>, <em>input rule snort</em>, dan hasil alert <em>snort</em> pada terminal linux. Untuk mempermudah monitoring alert diterminal linux, maka alert diimplementasikan pada email dan telegram serta guna mempermudah dalam aktifitas dalam aktifitas input rule snort maka dibuatlah <em>web interface snort </em>. Metode untuk menangani Snort berjalan pada <em>mode inline</em> dengan menggunakan modul <em>daq_afpacket</em> dalam snort itu sendiri, dan untuk melakukan blok ketika terjadi serangan, snort menggunakan <em>firewall iptables</em>. Alert diimplementasikan pada email menggunakan protokol <em>ssmtp</em> dan pada telegram menggunakan id dan api telegram. Hasil dari penelitian menyatakan pembuatan web <em>interface</em> dapat dengan mudah mengelola <em>rule</em> dan alert <em>snort</em>, serta dapat diaplikasikan dalam beberapa serangan yang diujikan.</p><p>_______________________________________________</p><p>Abstract</p><p><em>In general, snort is a firewall application that is configured in Linux terminals, including the implementation of snort, input snort rules, and snort warning results on Linux terminals. To monitor the linux warning alarm, the alerts are implemented on e-mail and telegram, as well as for input information in snort mode and then create a snort web interface. The method for handling Snort runs in inline mode by using the daq_afpacket module in the snort itself, and to block when an attack occurs, snort uses the iptables firewall. Alerts are implemented in e-mail using the ssmtp protocol and on telegrams using id and telegram fires. The results of the study state that making web interfaces can easily manage rules and snort alerts, and can be applied in several attacks that are tested.</em></p>
10

Karunajeewa, Asela S., Udantha R. Abeyratne, and Craig Hukins. "Silence–breathing–snore classification from snore-related sounds." Physiological Measurement 29, no. 2 (January 23, 2008): 227–43. http://dx.doi.org/10.1088/0967-3334/29/2/006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "SNORD":

1

Hebras, Jade. "Caractérisation moléculaire du petit ARN nucléolaire SNORD115 : un rôle dans la régulation de l'expression et de la fonction du récepteur à la sérotonine 5-HT2C ?" Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le nucléole des mammifères contient des centaines de petits ARN nucléolaires à boîte C/D (SNORD) dont la grande majorité guide une 2'-O-ribose méthylation sur les précurseurs des ARN ribosomiques (pré-ARNr). Certains SNORD facilitent aussi les clivages que subissent le pré-ARNr ou modifient le petit ARN nucléaire U6. Des travaux récents laissent également entrevoir que certains SNORD interagissent avec des ARNm. C'est le cas par exemple pour SNORD115 qui est au cœur de mon travail de thèse. SNORD115 est exprimé uniquement dans le cerveau à partir de nombreux gènes répétés en tandem situés au locus SNURF-SNRPN dont l'expression est contrôlée par l'empreinte génomique parentale. Des défauts génétiques associés à ce locus chromosomique sont associés à une maladie rare: le syndrome de Prader-Willi (SPW). SNORD115 est remarquable car il possède une longue complémentarité conservée avec l'ARNm codant un récepteur à la sérotonine, le variant 5-HT2C. Certains travaux proposent que SNORD115 régule la voie 5-HT2C en modulant l'épissage alternatif ou l'édition A vers I du pré-ARNm 5-HT2C. Un défaut dans l'activité du 5-HT2C pourrait être à l'origine de l'hyperphagie et/ou des anomalies comportementales qui caractérisent le SPW. Mon projet de thèse principal consistait à éprouver cette hypothèse grâce à un nouveau modèle murin CRISPR/Cas9 invalidé pour SNORD115. Mes résultats montrent que la perte d'expression de SNORD115 ne perturbe pas la régulation post-transcriptionnelle du pré-ARNm 5-HT2C in vivo. D'autre part, des études réalisées dans l'équipe n'ont pas permis de révéler des anomalies marquées dans les phénotypes anxio-dépressifs, ni dans le comportement alimentaire. Ma thèse soulève donc des questions importantes quant au rôle régulateur de SNORD115 dans le cerveau et de sa contribution potentielle dans l'étiologie du SPW. En parallèle, j'ai aussi abordé le répertoire des 2'-O-méthylations de l'ARNr dans des tissus murins, notamment le cerveau. Ce travail s'inscrivait dans la thématique émergente de la théorie du "ribosome spécialisé" qui propose qu'une hétérogénéité structurale des composants du ribosome puisse se traduire par des changements dans les capacités fonctionnelles du ribosome. Mes résultats montrent des variations dans la méthylation pour un nombre très limité de sites, et ce principalement au cours du développement. Aussi, les ribosomes des tissus développementaux sont globalement moins méthylés que ceux des tissus adultes. Nous avons concentré nos efforts sur LSU-G4593 dont la méthylation guidée par SNORD78 est retrouvée uniquement au cours du développement. Nous proposons que des évènements d'épissage alternatif du gène-hôte de SNORD78 modulent la production de SNORD78, et de fait le niveau de méthylation LSU-Gm4593. Grâce à l'étude d'une lignée cellulaire humaine (HEK293) invalidée pour SNORD78, j'ai recherché les implications fonctionnelles de LSU-Gm4593. A ce jour, mes travaux ne montrent pas un rôle marqué dans la prolifération cellulaire, ni dans la fidélité de la traduction. La fonction précise de LSU-Gm4593 demeure donc incomprise
The nucleolus of mammalian cells contains hundreds of box C/D small nucleolar RNAs (SNORDs). Majority of them, guide sequence-specific 2'-O ribose methylations into ribosomal RNA (rRNA). Some of them facilitate RNA folding and cleavages of ribosomal RNA precursors or guide ribose methylations into spliceosomal small nuclear RNA U6. Recent studies propose that some SNORD could target other transcripts, possibly messenger RNA as suggested by the brain-specific SNORD115. SNORD115 is processed from tandemly repeated genes embedded in the imprinted SNURF-SNRPN domain. Defects in gene expression at this domain are causally linked to rare disease: the Prader-Willi Syndrome (PWS). Excitingly, SNORD115 displays an extensive region of complementary to a brain-specific mRNA encoding the serotonin receptor 5-HT2C. SNORD115 could influence 5-HT2C signaling by fine-tuning alternative splicing or A to I RNA editing of 5-HT2C pre-mRNA. Reduced 5-HT2C receptor activity could contribute to impaired emotional response and/or compulsive overeating that characterized the syndrome. My work was to test this hypothesis using a CRISPR/Cas9-mediated SNORD115 knockout mouse model. My results show that loss of SNORD115 expression, in vivo, does not alter the post-transcriptional regulation of 5-HT2C pre-mRNA processing. Others results from the team do not reveal any defects in anxio-depressive phenotypes and eating behaviour. Our study questions the regulatory roles of SNORD115 in brain functions and behavioural disturbance associated with PWS. On other hand, I have studied ribose methylation sites in rRNA from mouse tissues. This work was included in emerging field of the specialized ribosome hypothesis which suggests heterogeneity in ribosomes may impact activity of ribosomes. Our results show significant changes at few discrete set of sites, especially in rRNA from developing tissues. Also, rRNA from developing tissues is globally less methylated than rRNA from adult tissues. We focus on LSU-Gm4593 site because this position is specifically methylated only during development and hardly ever detected in adult tissues. Methylation at LSU-G4593 is guided by SNORD78. We propose that the expression levels of SNORD78 during development appeared to be regulated by alternative splicing of the host-gene and to correlate with the methylation level of its target site at LSU-G4593. We've used a human cell line (HEK293T) inactivated for the SNORD78 gene in order to understand the functionally role of the corresponding ribose methylation. Our work did not demonstrate any overt cellular phenotypes, even though translation fidelity and the precise function of LSU-Gm4593 remains unknown
2

Ringström, Saltin Markus. "Intrusion Detection Systems : utvärdering av Snort." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3081.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Det här examensarbetet undersöker effektiviteten hos ett Intrusion Detection System(IDS). Ett IDS är ett system som skall upptäcka om klienter på ett nätverk attackerasav en ”hacker” eller om någon obehörig försöker inkräkta, ungefär som en vakthund.Det IDS som testats är Snort, ett mycket populärt IDS skrivet med öppen källkod.Syftet med studien är att kunna påvisa huruvida ett IDS är ett bra komplement till ettsystems säkerhet eller inte, då det gjorts väldigt få metodiska undersökningar avSnort, och IDS i allmänhet.Den studie som gjorts utfördes med hjälp av ett antal experiment i enlaborationsmiljö, där effektiviteten hos Snort sattes på prov med hjälp av olika typerav attacker.Utifrån det resultat som uppkom så går det att konstatera att ett IDS absolut är ettkomplement värt att överväga för en organisation som är villig att ägna de resursersom systemet kräver, då ett högt antal av de utförda attackerna upptäcktes – attackersom anti-virus eller brandväggar inte är skapade för att reagera på.

3

Steinvall, Daniel. "Utvärdering av signaturdatabaser i systemet Snort." Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72581.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Konstant uppkoppling till internet idag är en självklarhet för många världen över. Internet bidrar till en global förbindelse som aldrig tidigare varit möjligt, vilken kan tyckas vara underbart i många avseenden. Dessvärre kan denna digitala förbindelse missbrukas och användas för ondsinta ändamål vilket har lett till behov av säkerhetslösningar som bland annat nätverks-intrångsdetektionssystem. Ett av de mest omtalade verktygen som är ett exempel på ett sådant system är Snort som studeras i denna studie. Utöver analysering av Snort, evalueras även olika signaturdatabasers detektionsförmåga av angrepp. Totalt exekverades 1143 angrepp från 2008-2019 och dessa utvärderades av tre Snort-versioner daterade 2012, 2016 och 2018. Varje Snort-version analyserade angreppen med 18 signaturdatabaser daterade 2011-2019 från tre olika utgivare. Resultaten visar att det stor skillnad mellan de olika utgivarnas signaturdatabaser där den bästa detekterade runt 70% av angreppen medan den sämsta endast detekterade runt 1%. Även hur Snort konfigurerades hade stor inverkan på resultatet där Snort med för-processorn detekterade omkring 15% fler angrepp än utan den.
For many people all over the world being constantly connected to the Internet is taken for granted. The Internet connects people globally in a way that has never been possible before, which in many ways is a fantastic thing. Unfortunately, this global connection can be abused for malicious purposes which have led to the need for security solutions such as network intrusion detection systems. One prominent example of such a system is Snort which is the subject of evaluation in this thesis. This study investigates the ability of signature databases for Snort to detect cyberattacks. In total, we executed 1143 attacks released between 2008-2019 and recorded the network traffic. We then analyzed the network traffic using three versions of Snort released 2012, 2016, and 2018. For each version, we used 18 different signature databases dated 2011-2019 from three different publishers. Our results show that there are a significant difference between the different publishers’ signature databases, where the best signature database detected around 70% of the attacks and the worst only detected around 1%. The configuration of Snort also had a significant impact on the results, where Snort with the pre-processor detected about 15% more attacks than without it.
4

Magnusson, Jonas. "Intrångsdetekteringssystem : En jämförelse mellan Snort och Suricata." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Arbetets syfte är att jämföra intrångsdetekteringssystemen Snort och Suricata för att ge en uppfattning om vilken av applikationerna som lämpar sig att implementeras hos en internetleverantör för att upptäcka attacker och öka säkerheten på nätverket. Jämförelsen utförs med hänseende till antal upptäckta attacker, prestanda, implementeringstid, antal konfigurationsfiler samt vilka operativsystem de finns tillgängliga på.

Resultatet visar att Suricata med sitt stöd för att använda signaturer skapade för Snort upptäcker fler attacker än Snort. Snort däremot går både smidigare och snabbare att implementera. Prestandamässigt så visar Suricata bäst resultat, genom att använda sig av flera kärnor och mindre minne.

5

Fleming, Theodor, and Hjalmar Wilander. "Network Intrusion and Detection : An evaluation of SNORT." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). This system monitors the traffic sent to, from and within the network. This study investigates how a NIDS called SNORT with different configurations handles common network attacks. The knowledge of how SNORT managed the attacks is used to evaluate and indicate the vulnerability of different SNORT configurations. Different approaches on both how to bypass SNORT and how to detect attacks are described both theoretically, and practically with experiments. This study concludes that a carefully prepared configuration is the factor for SNORT to perform well in network intrusion detection.
6

Zhang, Huan. "Parallelization of a software based intrusion detection system - Snort." Thesis, University of Canterbury. Electrical and Computer Engineering, 2011. http://hdl.handle.net/10092/5988.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Computer networks are already ubiquitous in people’s lives and work and network security is becoming a critical part. A simple firewall, which can only scan the bottom four OSI layers, cannot satisfy all security requirements. An intrusion detection system (IDS) with deep packet inspection, which can filter all seven OSI layers, is becoming necessary for more and more networks. However, the processing throughputs of the IDSs are far behind the current network speed. People have begun to improve the performance of the IDSs by implementing them on different hardware platforms, such as Field-Programmable Gate Array (FPGA) or some special network processors. Nevertheless, all of these options are either less flexible or more expensive to deploy. This research focuses on some possibilities of implementing a parallelized IDS on a general computer environment based on Snort, which is the most popular open-source IDS at the moment. In this thesis, some possible methods have been analyzed for the parallelization of the pattern-matching engine based on a multicore computer. However, owing to the small granularity of the network packets, the pattern-matching engine of Snort is unsuitable for parallelization. In addition, a pipelined structure of Snort has been implemented and analyzed. The universal packet capture API - LibPCAP has been modified for a new feature, which can capture a packet directly to an external buffer. Then, the performance of the pipelined Snort can have an improvement up to 60% on an Intel i7 multicore computer for jumbo frames. A primary limitation is on the memory bandwidth. With a higher bandwidth, the performance of the parallelization can be further improved.
7

Dominguez-Camara, Rosario. "Multiparameter assessment of speech using SNORS+ with integrated EMG analysis." Thesis, University of Kent, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418555.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Albin, Eugene. "A comparative analysis of the Snort and Suricata intrusion-detection systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5480.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Approved for public release; distribution is unlimited.
Our research focuses on comparing the performance of two open-source intrusion-detection systems, Snort and Suricata, for detecting malicious activity on computer networks. Snort, the de-facto industry standard open-source solution, is a mature product that has been available for over a decade. Suricata, released two years ago, offers a new approach to signature-based intrusion detection and takes advantage of current technology such as process multithreading to improve processing speed. We ran each product on a multi-core computer and evaluated several hours of network traffic on the NPS backbone. We evaluated the speed, memory requirements, and accuracy of the detection engines in a variety of experiments. We conclude that Suricata will be able to handle larger volumes of traffic than Snort with similar accuracy, and thus recommend it for future needs at NPS since the Snort installation is approaching its bandwidth limits.
9

Kurukkankunnel, Joy Cyril, and Sherjin Dan Thomas. "A Study of Intrusion detection on PROFINET Network by Improving SNORT." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43350.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This report is a result of master thesis in network forensics at Halmstad University during spring term 2018. Industrial engineers are becoming aware of the importance of network security. In today's industrial system, attacks on industrial control system are becoming more commonplace. The availability of industrial specific search engine which can reveal system to anyone interested, has made it easier to target vulnerable systems. Years ago, the networks that are not connected to a public network were considered "Safe". Today these networks are inter-connected, and the challenge is how to make them secure. To protect industrial control systems, monitoring of the industrial network is required to find abnormal activities. There are many open source intrusion detection systems available we have chosen SNORT for our project work since SNORT is a powerful open source intrusion detection system and has many default sets of rules also communitybased rules can be implemented. SNORT has features such as real-time traffic analysis, logging packets and content searching ability. SNORT has limited capability in understanding the PROFINET protocol and the aim of our project is to modify SNORT application to read PROFINET packets so that it can be used in industrial networks running on PROFINET protocol and create rules for PROFINET by examining the data captured from the lab environment.
10

Meyer, Steven J. "GPS Receiver Testing on the Supersonic Naval Ordnance Research Track (SNORT)." International Foundation for Telemetering, 1997. http://hdl.handle.net/10150/609808.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
International Telemetering Conference Proceedings / October 27-30, 1997 / Riviera Hotel and Convention Center, Las Vegas, Nevada
There is an interest in using Global Positioning System (GPS) receivers to find: Time Space Position Information (TSPI), miss distances between a missile and target, and using the data real time as an independent tracking aid for range safety. Ashtech, Inc. has several standalone GPS receivers they believe can work at high g levels. This paper investigates how the Ashtech GPS receivers work under high g loading in one axis. The telemetry system used to collect data from the receivers and the reconstruction of the data will also be discussed. The test was done at SNORT (Supersonic Naval Ordnance Research Track) located at NAWS, China Lake, CA. The g level obtained was about +23 g’s with a deceleration of -15 g’s. The velocity reached was about Mach 2.0. A summary of the errors is included.

Книги з теми "SNORD":

1

Bendall-Brunello, John. Snore, dinosaur, snore! New York: Marshall Cavendish, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hansen, Cindy S. Snore-dom busters. Loveland, Colo: Group Pub., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Williams, Rozanne Lanczak. The purple snerd. San Diego: Harcourt, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

L, Miller M. The enormous snore. New York, NY: Putnam's, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Scott, Charlie. Snort for dummies. Hoboken, NJ: Wiley Pub., 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Scott, Charlie. Snort For Dummies. New York: John Wiley & Sons, Ltd., 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Meister, Cari. Snorp the city monster =: Snorp el monstruo de la ciudad. Mankato, Minn: Capstone Stone Arch Books, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Meister, Cari. Snorp, the city monster. Minneapolis, Minn: Stone Arch Books, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Waber, Bernard. The mouse that snored. Boston: Houghton Mifflin, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Arnold, Marsha Diane. Roar of a snore. New York: Dial Books for Young Readers, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "SNORD":

1

O’Leary, Mike. "Snort." In Cyber Operations, 947–82. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

O’Leary, Mike. "Snort." In Cyber Operations, 605–41. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shahid, Azmeh, Kate Wilkinson, Shai Marcu, and Colin M. Shapiro. "Snore Outcomes Survey (SOS)." In STOP, THAT and One Hundred Other Sleep Scales, 359–61. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-9893-4_88.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chi, Ruinan. "Intrusion Detection System Based on Snort." In Lecture Notes in Electrical Engineering, 657–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40633-1_82.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

de Silva, Shaminda, Udantha R. Abeyratne, Asela S. Karunajeewa, and Craig Hukins. "Effect of Background Sound and Impact of Snore Episode Length Normalization on Snore-Based Apnea Diagnosis." In IFMBE Proceedings, 2311–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03882-2_614.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Saganowski, Łukasz, Marcin Goncerzewicz, and Tomasz Andrysiak. "Anomaly Detection Preprocessor for SNORT IDS System." In Advances in Intelligent Systems and Computing, 225–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-32384-3_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nishijima, Keisuke, Shingo Uenohara, and Ken’ichi Furuya. "Evaluating Classification Methods in Snore Activity Detection." In Advances in Intelligent Systems and Computing, 921–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93659-8_85.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mohanta, Abhijit, and Anoop Saldanha. "IDS/IPS and Snort/Suricata Rule Writing." In Malware Analysis and Detection Engineering, 819–50. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_23.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

"Snore." In Handbook of Disease Burdens and Quality of Life Measures, 4323. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-0-387-78665-0_6668.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Baker, Andrew R., Brian Caswell, Mike Poor, Stephen Northcutt, Raven Alder, Jacob Babbin, Jay Beale, et al. "Installing Snort." In Snort 2.1 Intrusion Detection, 99–164. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193183604-3/50008-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "SNORD":

1

Gupta, Shikha, Prerana Jha, Chitra Sarkar, and Ritu Kulshreshtha. "Abstract 3482: SNORD-X in glioblastoma: regulation and functional analysis." In Proceedings: AACR Annual Meeting 2017; April 1-5, 2017; Washington, DC. American Association for Cancer Research, 2017. http://dx.doi.org/10.1158/1538-7445.am2017-3482.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ankishan, Haydar, and A. Turgut Tuncer. "A new portable device for the snore/non-snore classification." In 2017 International Conference on Engineering and Technology (ICET). IEEE, 2017. http://dx.doi.org/10.1109/icengtechnol.2017.8308212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Azarbarzin, Ali, and Zahra Moussavi. "Unsupervised classification of respiratory sound signal into snore/no-snore classes." In 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010). IEEE, 2010. http://dx.doi.org/10.1109/iembs.2010.5627650.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Howell, Richard M., Anthony D. Lucey, and Peter W. Carpenter. "Instability of a Cantilevered Flexible Plate in Inviscid Channel Flow." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93941.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A novel method for calculating the linear fluid-structure interaction of a cantilevered flexible plate centrally positioned in ideal channel flow, incorporating the effects of vorticity shed downstream, is described. When the channel walls are moved far apart, predictions of the critical velocity show good correlation with other published work. For the first time, detailed numerical investigation of the effect on this fluid-structure interaction of channel walls, a rigid central surface (upstream and adjacent to the flexible plate), unsteady mean flow and the variation of stiffness and damping properties along the flexible plate have been quantified. Of central importance is the application of the unsteady model to the investigation of the human snoring phenomenon. Further insight into the operation of two types of snore is made and a new type of snore is discovered that originates from the time-dependent effects of inhalation.
5

Khurat, Assadarat, and Wudhichart Sawangphol. "An Ontology for SNORT Rule." In 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2019. http://dx.doi.org/10.1109/jcsse.2019.8864190.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chakrabarti, S., M. Chakraborty, and I. Mukhopadhyay. "Study of snort-based IDS." In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1741914.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fang, Xianjin, and Lingbing Liu. "Integrating Artificial Intelligence into Snort IDS." In 2011 3rd International Workshop on Intelligent Systems and Applications (ISA). IEEE, 2011. http://dx.doi.org/10.1109/isa.2011.5873435.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tung Tran, I. Aib, E. Al-Shaer, and R. Boutaba. "An evasive attack on SNORT flowbits." In 2012 IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). IEEE, 2012. http://dx.doi.org/10.1109/noms.2012.6211918.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nishijima, Keisuke, Shingo Uenohara, and Ken'ichi Furuya. "Snore activity detection using smartphone sensors." In 2015 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2015. http://dx.doi.org/10.1109/icce-tw.2015.7216814.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Al-Mamory, S. O., A. Hamid, A. Abdul-Razak, and Z. Falah. "String matching enhancement for snort IDS." In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711211.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії