Intrusions

Inclusions of words that were not on the test list.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2005
Review
2005
The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Primary fixation is never perfectly stable, but is frequently interrupted by slow drifts, microsaccades and saccadic intrusions… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The paper suggests that the negative idiosyncratic meaning of posttraumatic intrusions (e.g., 'I am going crazy') and cognitive… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on… (More)
  • table 2
  • table 1
  • table 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : xi 
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 3.1
  • figure 3.2
Is this relevant?
Highly Cited
1992
Highly Cited
1992
SRI International has designed and developed a real-time intrusion-detection expert system (IDES). IDES is a stand-alone system… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 5.1
Is this relevant?
Highly Cited
1979
Highly Cited
1979
Clinical, field, and experimental studies of response to potentially stressful life events give concordant findings: there is a… (More)
  • table 1
  • table 2
  • table 3
  • table 5
Is this relevant?