Dental Intrusion

Known as: Intrusion 
A translational form of tooth movement directed apically and parallel to the long axis.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 5
Is this relevant?
Review
2016
Review
2016
As part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The… (More)
  • figure 2
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
I intend to keep a collection of links at the book’s web page, http://www.rossanderson.com. Please check out this page if a link… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
One of the primary challenges in intrusion detection is modelling typical application behavior, so that we can recognize attacks… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
ŠG‹UŒŽe‘’”“n‹e‘Y• “n‘Ž– —|‘Ž– ’”“n`‘Y‘4– ˜ ™’”Œ›šœŒ4™– —žŒ ’Ÿ‹2— ‹™– Œd “S4¡&– ‹U¢£’”“n‹e¤2– ‹UŒ ¥ —S‹e¦§Œ4e– 4… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
All currently available network intrusion detection (ID) systems rely upon a mechanism of data collection---passive protocol… (More)
Is this relevant?
Highly Cited
1979
Highly Cited
1979
Clinical, field, and experimental studies of response to potentially stressful life events give concordant findings: there is a… (More)
  • table 1
  • table 2
  • table 3
  • table 5
Is this relevant?