期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Benzodiazepines in complex biological matrices: Recent updates on pretreatment and detection methods 被引量:1
1
作者 Yi-Xin Zhang Yuan Zhang +5 位作者 Yu Bian Ya-jie Liu Ai Ren Yu Zhou Du Shi Xue-Song Feng 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2023年第5期442-462,共21页
Benzodiazepines(BDZs)are used in clinics for anxiolysis,anticonvulsants,sedative hypnosis,and muscle relaxation.They have high consumptions worldwide because of their easy availability and potential addiction.They are... Benzodiazepines(BDZs)are used in clinics for anxiolysis,anticonvulsants,sedative hypnosis,and muscle relaxation.They have high consumptions worldwide because of their easy availability and potential addiction.They are often used for suicide or criminal practices such as abduction and drug-facilitated sexual assault.The pharmacological effects of using small doses of BDZs and their detections from complex biological matrices are challenging.Efficient pretreatment methods followed by accurate and sensitive detections are necessary.Herein,pretreatment methods for the extraction,enrichment,and preconcentration of BDZs as well as the strategies for their screening,identification,and quantitation developed in the past five years have been reviewed.Moreover,recent advances in various methods are summarized.Characteristics and advantages of each method are encompassed.Future directions of the pretreatment and detection methods for BDZs are also reviewed. 展开更多
关键词 BENZODIAZEPINE Biological matrices detectionmethods Samplepreparation
暂未订购
Performance Study of Distributed Multi-Agent Intrusion Detection System
2
作者 YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan 《Computer Aided Drafting,Design and Manufacturing》 2005年第2期38-43,共6页
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average. 展开更多
关键词 distributed intrusion detection system multi-agent intrusion detectionmethod information security
在线阅读 下载PDF
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges 被引量:2
3
作者 Tinshu Sasi Arash Habibi Lashkari +2 位作者 Rongxing Lu Pulei Xiong Shahrear Iqbal 《Journal of Information and Intelligence》 2024年第6期455-513,共59页
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co... The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter. 展开更多
关键词 Internet of Things IoTattacks TAXONOMY VULNERABILITIES detectionmethods CHALLENGES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部