Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,326,127 papers from all fields of science
Search
Sign In
Create Free Account
Integrated Data Store
Known as:
IDS
, IDS - Integrated Data Store
Integrated Data Store (IDS) was an early network database largely used by industry, known for its high performance. IDS became the basis for the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
ACM Turing Award
CODASYL
Data Base Task Group
Data model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Enhanced Negative Selection Algorithm for Malicious Node Detection in MANET
Kathiroli Raja
,
I. Natarajan
International Conference on Advanced Computing
2017
Corpus ID: 52118781
Intrusion detection in MANETS is inevitable as these networks are dynamic, open and no central authority to monitor the nodes…
Expand
2016
2016
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence
N. Sheikh
,
Kanyasree Mustafi
,
I. Mukhopadhyay
Ubiquitous Computing, Electronics & Mobile…
2016
Corpus ID: 1165738
The security related issues in the Internet have drawn a constant attention due to rapid growth of attack and its devastating…
Expand
2016
2016
Research of Intrusion Detection Method Based on Ant Colony Clustering
Qiang Yue
,
Zhong-yu Hu
,
Shi-tuan Shen
,
Dawei Zhang
2016
Corpus ID: 74871469
Network intrusion detection has been intensively investigated in recent years. In this paper, we propose an adaptive method based…
Expand
2012
2012
An Evolutionary Approach to Intrusion Detection System using Genetic Algorithm
Bharat S. Dhak
,
Shrikant Lade
2012
Corpus ID: 15065134
— With the rapid change and development in the sector of Information Technology and in Network technologies; the value of data…
Expand
2009
2009
Impact of cosmic inhomogeneities on SNe observations
K. Kainulainen
,
V. Marra
2009
Corpus ID: 62821011
We study the impact of cosmic inhomogeneities on the interpretation of SNe observations. We build an inhomogeneous universe model…
Expand
2008
2008
Intelligent techniques for network sensor information processing in large-scale network infrastructures
E. Hooper
International Conference on Intelligent Sensors…
2008
Corpus ID: 16182921
Intrusion detection systems (IDSs) and security tools are used to monitor potential attacks in network infrastructures. These…
Expand
2006
2006
Efficient sequence alignment of network traffic
C. Kreibich
,
J. Crowcroft
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 1189347
String comparison algorithms, inspired by methods used in bioinformatics, have recently gained popularity in network applications…
Expand
2006
2006
An intelligent detection and response strategy to false positives and network attacks: operation of network quarantine channels and feedback methods to IDS
E. Hooper
Security, Privacy and Trust in Pervasive and…
2006
Corpus ID: 1545831
Network-based intrusion detection systems (IDSs) are designed to monitor potential attacks in network infrastructures. IDSs…
Expand
2004
2004
Intrusion detection for wireless local area network
Hongyu Yang
,
Lixia Xie
,
Ji-Zhao Sun
Canadian Conference on Electrical and Computer…
2004
Corpus ID: 9956567
Wireless intrusion detection systems are an important addition to the security of wireless local area networks (WLANs). We focus…
Expand
2003
2003
MedMOLE : Mining literature to extract biological knowledge by microarray data
E. Rossi
,
R. Turra
2003
Corpus ID: 14090225
DNA microarray technology is a high throughput method for gaining information on gene function. It allows the simultaneous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE