Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Integrated Data Store

Known as: IDS, IDS - Integrated Data Store 
Integrated Data Store (IDS) was an early network database largely used by industry, known for its high performance. IDS became the basis for the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Intrusion detection in MANETS is inevitable as these networks are dynamic, open and no central authority to monitor the nodes… Expand
  • table I
  • table II
  • table III
  • figure 2
  • figure 3
2016
2016
The security related issues in the Internet have drawn a constant attention due to rapid growth of attack and its devastating… Expand
  • table I
  • table III
  • table II
  • table V
  • table IV
2009
2009
We study the impact of cosmic inhomogeneities on the interpretation of SNe observations. We build an inhomogeneous universe model… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2008
2008
  • E. Hooper
  • International Conference on Intelligent Sensors…
  • 2008
  • Corpus ID: 16182921
Intrusion detection systems (IDSs) and security tools are used to monitor potential attacks in network infrastructures. These… Expand
  • figure 1
  • table I
2006
2006
String comparison algorithms, inspired by methods used in bioinformatics, have recently gained popularity in network applications… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2003
2003
DNA microarray technology is a high throughput method for gaining information on gene function. It allows the simultaneous… Expand
  • figure 2
  • figure 1
  • figure 3
  • table 1
Highly Cited
2002
Highly Cited
2002
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1969
Highly Cited
1969
Successful communication of ideas has been and will continue to be a limiting factor in man's endeavors to survive and to better… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 6
1964
1964
During the past ten years, information processing technology has made significant advances in many directions. Faster, less… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5