Essays about: "IDS"

Showing result 21 - 25 of 95 essays containing the word IDS.

  1. 21. Understanding the behaviour of  IOCs during their lifecycle

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Navya sree Godavarti; Sivani Modali; [2022]
    Keywords : Indicator of compromise IOC ; Cybersecurity; Confidence level of IOC.;

    Abstract : An indicator of compromise is a digital artefact that detects data compromise. They sense the compromise happening, trace the intrusion and collect data. This data includes breached data and the address. All indicators have a limited period of a lifetime, in which these work the best time in their peak. READ MORE

  2. 22. Study testing of Dampers in Prototype Blade in Figure Skating Landings

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Anoop George; Anilkrishnan Vasundharan Rema Bai; [2022]
    Keywords : ;

    Abstract : This thesis is primarily intended to estimate the technical feasibility of an invention while also attaining product development as a project. A new cushioning FS blade with an integrated damping system (FSB-IDS), developed to reduce the vibration and acceleration of the impact. READ MORE

  3. 23. Relation between vowel hypo-/hyperarticulation and vocal affect in Swedish infant directed speech

    University essay from Stockholms universitet/Institutionen för lingvistik

    Author : Bente Sand Aronsson; [2022]
    Keywords : Infant-directed speech; vocal affect; vowel hypo- hyperarticulation; language acquisition; Barnriktat tal; röstkänsla; vokalhypo- hyperartikulation; språkinlärning;

    Abstract : Vowel hyperarticulation and hyper affect are two characteristics of infant-directed speech (IDS), reported in several studies. Vowel hyperarticulation has been suggested to be a way in which adults subconsciously facilitate infants’ language acquisition, but it has also been argued to be the acoustic by-product of an affective speaking style. READ MORE

  4. 24. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System

    University essay from

    Author : Trayi Chaganti; Tadi Rohith; [2022]
    Keywords : Anomaly detection; Computing methodologies; Machine learning; Real-time Ethernet; Supervised learning;

    Abstract : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. READ MORE

  5. 25. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Willerton; Rasmus Gustafsson; [2022]
    Keywords : Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Abstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE