Skip to search formSkip to main contentSkip to account menu

Integrated Data Store

Known as: IDS, IDS - Integrated Data Store 
Integrated Data Store (IDS) was an early network database largely used by industry, known for its high performance. IDS became the basis for the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Intrusion detection in MANETS is inevitable as these networks are dynamic, open and no central authority to monitor the nodes… 
2016
2016
The security related issues in the Internet have drawn a constant attention due to rapid growth of attack and its devastating… 
2016
2016
Network intrusion detection has been intensively investigated in recent years. In this paper, we propose an adaptive method based… 
2012
2012
— With the rapid change and development in the sector of Information Technology and in Network technologies; the value of data… 
2009
2009
We study the impact of cosmic inhomogeneities on the interpretation of SNe observations. We build an inhomogeneous universe model… 
2008
2008
Intrusion detection systems (IDSs) and security tools are used to monitor potential attacks in network infrastructures. These… 
2006
2006
String comparison algorithms, inspired by methods used in bioinformatics, have recently gained popularity in network applications… 
2006
2006
Network-based intrusion detection systems (IDSs) are designed to monitor potential attacks in network infrastructures. IDSs… 
2004
2004
Wireless intrusion detection systems are an important addition to the security of wireless local area networks (WLANs). We focus… 
2003
2003
DNA microarray technology is a high throughput method for gaining information on gene function. It allows the simultaneous…