Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,631,710 papers from all fields of science
Search
Sign In
Create Free Account
Integrated Data Store
Known as:
IDS
, IDS - Integrated Data Store
Integrated Data Store (IDS) was an early network database largely used by industry, known for its high performance. IDS became the basis for the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
ACM Turing Award
CODASYL
Data Base Task Group
Data model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
EVALUATING K-MEANS++ CLUSTERING FOR ANOMALY-BASED INTRUSION DETECTION SYSTEMS-FOCUS ON EXTERNAL THREATS
M. K. Coughlan
,
J. Tucker
,
Tommy Nelson
,
Benjamin Klimkowski
2017
Corpus ID: 51994895
Intrusion detection systems (IDS) are systems used to defend a network against cyber attacks. Specifically, anomaly-based IDSs…
Expand
2016
2016
Research of Intrusion Detection Method Based on Ant Colony Clustering
Qiang Yue
,
Zhong-yu Hu
,
Shi-tuan Shen
,
Dawei Zhang
2016
Corpus ID: 74871469
Network intrusion detection has been intensively investigated in recent years. In this paper, we propose an adaptive method based…
Expand
Review
2016
Review
2016
Content-based Comparsion for Collections Identification
Weijia Xu
,
Ruizhu Huang
,
M. Esteva
,
Jawon Song
,
R. Walls
2016
Corpus ID: 39784777
Assigning globally unique persistent identifiers (GUPIs) to datasets has the goal of increasing their accessibility and…
Expand
2016
2016
Cyber Security for Remote Patient Monitoring System
B. Manjulatha
2016
Corpus ID: 42094609
The Internet of Things is an emerging topic of technical, social, and economic significance. Consumer products, durable goods…
Expand
2012
2012
An Evolutionary Approach to Intrusion Detection System using Genetic Algorithm
Bharat S. Dhak
,
Shrikant Lade
2012
Corpus ID: 15065134
— With the rapid change and development in the sector of Information Technology and in Network technologies; the value of data…
Expand
2012
2012
Cross-domain vulnerabilities over social networks
Catherine Bernard
,
Hervé Debar
,
Salim Benayoune
Computational Aspects of Social Networks
2012
Corpus ID: 16630650
Recent years have seen a tremendous growth of social networks such as Facebook and Twitter. At the same time, the share of video…
Expand
2009
2009
Impact of cosmic inhomogeneities on SNe observations
K. Kainulainen
,
V. Marra
2009
Corpus ID: 62821011
We study the impact of cosmic inhomogeneities on the interpretation of SNe observations. We build an inhomogeneous universe model…
Expand
2009
2009
Payoff Based IDS Evaluation
Michael Collins
CSET
2009
Corpus ID: 15184603
IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism…
Expand
2005
2005
A Novel IDS Agent Distributing Protocol for MANETs
Xin Jin
,
Yaoxue Zhang
,
Yuezhi Zhou
,
Yaya Wei
International Conference on Conceptual Structures
2005
Corpus ID: 195600852
Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) is becoming an exciting and important technology in very…
Expand
2003
2003
MedMOLE : Mining literature to extract biological knowledge by microarray data
E. Rossi
,
R. Turra
2003
Corpus ID: 14090225
DNA microarray technology is a high throughput method for gaining information on gene function. It allows the simultaneous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE