Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,293 papers from all fields of science
Search
Sign In
Create Free Account
Inventory of drinking situations
Known as:
IDS
, inventory of drinking situations (IDS)
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Accountable Health Plans
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Captcha - Based Intrusion Detection Model
B. Souley
,
Hauwa Abubakar
2018
Corpus ID: 40059273
Intrusion Detection systems (IDS) are an essential element for Network Security Infrastructure and play an important role in…
Expand
Review
2016
Review
2016
A survey of intrusion detection systems for cloud computing environment
Z. Chiba
,
N. Abghour
,
K. Moussaid
,
Amina El omri
,
M. Rida
International Conference on Engineering & MIS…
2016
Corpus ID: 40335152
Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing…
Expand
2016
2016
DoS attacks prevention using IDS and data mining
Anand Keshri
,
Sukhpal Singh
,
Mayank Agarwal
,
Sunit Kumar Nandiy
International Conference on Accessibility to…
2016
Corpus ID: 26762255
Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many…
Expand
2014
2014
A proposed HTTP service based IDS
Mohamed M. Abd-Eldayem
2014
Corpus ID: 60748515
2009
2009
An Advanced IDS Management Architecture
S. Roschke
,
Feng Cheng
,
C. Meinel
2009
Corpus ID: 2482383
Efficient Intrusion Detection System (IDS) management is a prominent capability for distributed IDS solutions, which makes it…
Expand
2008
2008
Secure WBAN using rule-based IDS with biometrics and MAC authentication
K. Sharmilee
,
R. Mukesh
,
A. Damodaram
,
V. Subbiah Bharathi
International Conference on e-Health Networking…
2008
Corpus ID: 18279763
Security in wireless sensor networks has become very much important as sensor networks are being used for sensitive applications…
Expand
2008
2008
Study of Intrusion Detection Systems (IDSs) in Network Security
Wu Junqi
,
Zhengbing Hu
International Conference on Wireless…
2008
Corpus ID: 18178795
In recent years, the network attack become more and more widespread and difficult in against. The traditional technique, such as…
Expand
2007
2007
Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment
J. Oh
,
Sang-Kil Park
,
Jongsoo Jang
,
Yong-Hee Jeon
2007
Corpus ID: 14957753
Summary BcN(Broadband convergence Networks) is being deployed in order to support a variety of network applications such as…
Expand
2000
2000
Cost Reduction after Introduction of a Multidisciplinary Infectious Disease Service at a German University Hospital
S. Wolf
,
L. Leitritz
,
C. Rupp
,
D. Schlöndorff
,
J. Bogner
Infection
2000
Corpus ID: 35196266
SummaryBackground: In 1997 an infectious disease service (IDS) similar to those in the US was established at a university…
Expand
1966
1966
The Assessment of Self Concept Among Four-Year-Old Negro and White Children: A Comparative Study Using the Brown-IDS Self Concept Referents Test.
B. Brown
1966
Corpus ID: 59948824
DOCUMENT RESUME UD 007 496 Brown, Bert F. The Assessment of Self Concept Among Four-Year-Old Negro and White Cl,ildren: A…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE