• No se han encontrado resultados

and alerts

Distributed exchange of alerts for the detection of coordinated attacks

Distributed exchange of alerts for the detection of coordinated attacks

... receive and handle a private and a public ...privately and to authenticate each other, thus preventing malicious nodes from impersonating legal ...exchanging alerts in a pseudonymous ...

8

Optimized molecular resolution of cross-contamination alerts in clinical mycobacteriology laboratories

Optimized molecular resolution of cross-contamination alerts in clinical mycobacteriology laboratories

... high and it succeded in resolving alerts even under cir- cumstances that were not appropriate for the RFLP analy- sis ...cross-contamination alerts could enable more rapid management of suspected ...

5

A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

... aggregation and analysis, using a similarity-based technique. Valdes and Skinner also develops a similarity-based technique, using a probabilistic approach to perform correlation of output data from mutiple ...

10

Keeping up to date, september 2010

Keeping up to date, september 2010

... News and the Europa Press agency current affairs and news ...Youkioske and Digg also include news stories, links to publications of interest, videos and images and also personalisation ...

14

Revista Ingeniería Investigación y Tecnología | Facultad de Ingeniería UNAM

Revista Ingeniería Investigación y Tecnología | Facultad de Ingeniería UNAM

... services, and others, the use of automated systems that deliver critical business information anytime and anywhere play an important role in the decision making ...secure alerts and ...

15

User Documentation for MDHT Runtime APIs

User Documentation for MDHT Runtime APIs

... CCD Alerts Section also using the CCD API and add it to the document using a convenience method named addSection from the ClinicalDocument ...StringBuffer and then use it to construct the narrative ...

31

An Architecture for Securing Communications in Critical Infrastructure

An Architecture for Securing Communications in Critical Infrastructure

... collect information about the applications that are running inside the host. This information includes system calls, software executed, application spe- cific or operating system logs, etc. This data is useful to detect ...

11

There are genus one curves of every index over every infinite, finitely generated field

There are genus one curves of every index over every infinite, finitely generated field

... as we require gcd(P, p) = 1. The case of p-power period in characteristic p leads to additional technicalities involving an explicit form of the period-index obstruction map in flat cohomology. (The first author ...

21

Show all 10000 documents...

Related subjects