3 resultados para Malicious nodes
em Nottingham eTheses
Resumo:
In embracing a multidisciplinary approach to the management of patients with sentinel node biopsy in breast cancer, the pathologist task is to screen sentinel nodes for possible metastasis. The consequences of missing sentinel node micrometastasis can directly influence treatment strategies, and this screening therefore has to be performed with more attention than usual. There is presently great diversity in the histopathological work-up of sentinel nodes, with many centres employing additional techniques such as immunohistochemistry, reverse transcription polymerase chain reaction or flow cytometry in addition to routine haematoxylin and eosin staining. In this review, we address the pathological validation and significance of micrometastasis in sentinel node biopsy in primary breast cancer
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.