450 research outputs found
Evaluation of Intelligent Intrusion Detection Models
This paper discusses an evaluation methodology that can be used to assess the performance of intelligent techniques at detecting, as well as predicting, unauthorised activities in networks. The effectiveness and the performance of any developed intrusion detection model will be determined by means of evaluation and validation. The evaluation and the learning prediction performance for this task will be discussed, together with a description of validation procedures. The performance of developed detection models that incorporate intelligent elements can be evaluated using well known standard methods, such as matrix confusion, ROC curves and Lift charts. In this paper these methods, as well as other useful evaluation approaches, are discussed.Peer reviewe
Joseph A. Johnston, MD: An Appreciation
EDITOR\u27S NOTE: Over the years many fine and distinguished physicians have helped make Henry Ford Hospital one of the leading medical institutions in Michigan and throughout the United States. With this issue we begin our tribute to those pioneers who have played an integral part in the history of Henry Ford Hospital. At the first meeting of the Henry Ford Hospital Joseph A. Johnston Pediatric Society, October 11. 1985. Dr Gordon Manson honored the late Dr Johnston. The following is Dr Manson\u27s personal presentation and tribute to his long-time friend and colleague, Johnny Johnston
Bayesian Learning Networks Approach to Cybercrime Detection
The growing dependence of modern society on telecommunication and information networks has become inevitable. The increase in the number of interconnected networks to the Internet has led to an increase in security threats and cybercrimes such as Distributed Denial of Service (DDoS) attacks. Any Internet based attack typically is prefaced by a reconnaissance probe process, which might take just a few minutes, hours, days, or even months before the attack takes place. In order to detect distributed network attacks as early as possible, an under research and development probabilistic approach, which is known by Bayesian networks has been proposed. This paper shows how probabilistically Bayesian network detects communication network attacks, allowing for generalization of Network Intrusion Detection Systems (NIDSs). Learning Agents which deploy Bayesian network approach are considered to be a promising and useful tool in determining suspicious early events of Internet threats and consequently relating them to the following occurring activities.Peer reviewe
Immunoglobulin Levels in Serum of Normal Infants and Pre-School Children as Determined by Immunochemical Analysis
Standards for determining serum immunoglobulin (Ig) levels in infants and preschool children are now possible as a result of data compiled and presented in this paper. These can be compared with adult standards used in this hospital and presented in earlier issues of the MEDICAL JOURNAL. The Hospital\u27s laboratory technique is compared with other methods for measuring IgM, IgA and IgG serum levels
Recommended from our members
A Field test of the Fortune/Hutchinson evaluation methodology as it could be employed in the evaluation of National Urban League street academies.
EducationDoctor of Education (Ed.D.
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system. However, this approach often leads to problems, which translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and systems engineering. This paper argues for the need to develop a methodology that considers security as an integral part of the whole system development process. The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a case study; a health and social care information system
Testing the Suitability and the Limitations of Agent Technology to Support Integrated Assessment of Health and Social Care Needs of Older People
This paper explores the potential and
the limitations of agent technology to support delivery of integrated information systems for the health and social care sector. In doing so, it points out the similarities and the mutual characteristics
(such as distribution of expertise) of integrated health and social care information systems and agent technology. On the other hand, it identifies an important limitation of agent technology in the
development of health and social care systems, which is the lack of a complete and mature analysis and design methodology that will provide guidance in the analysis and design of complex computer-based systems for health and social care. The Single Assessment Process (SAP) [http://www.doh.gov.uk/scg/sap/], an integrated assessment of health and social care needs of older people is used as an example of an integrated health and social care information system throughout the paper
Modelling Secure Multiagent Systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages could help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts is given along with an explanation of how these concepts are integrated to the current stages of Tropos. An example from the health care sector is used to illustrate the above
An Ontology for Modelling Security: The Tropos Approach
It has been argued that security concerns should inform all the stages of the development process of an agent-based system. However, this is not the case since current agent-oriented methodologies do not, usually, consider security concepts within their modelling ontology. In this paper we present extensions to the Tropos ontology to enable it to model security
Using Security Attack Scenarios to Analyse Security During Information Systems Design
It has been widely argued in the literature that security concerns should be integrated with software engineering practices. However, only recently work has been initiated towards this direction. Most of this work, however, only considers how security can be analysed during the development lifecycles and not how the security of an information system can be tested during the analysis and design stages. In this paper we present results from the development of a technique, which is based on the use of scenarios, to test the reaction of an information system against potential security attacks
- …