نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

2002
Paulo Veríssimo Nuno Ferreira Neves Miguel Correia

There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the oth...

2017
Rashmi Chaudhari Sonal Patil

An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...

Journal: :Computers & Security 1993
Teresa F. Lunt

Intrusion detection is an alternative to the situation of the security violation.Security mechanism of the network is necessary against the threat to the system. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. This paper describes a brief overvie...

2003
Jianhua Sun Hai Jin Hao Chen Qian Zhang Zongfen Han

Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. However, the performance of misuse intrusion detection system (MIDS) or anomaly intrusion detection system (AIDS) is not satisfying. In this paper, we study the issue of building a compound intrusion detection model, w...

2011
Kamini Nalavade

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. If the attacks are detected successfully, then preventive measures for attacks can be taken. Host based and netwo...

Journal: :Minerals 2021

This review paper aims to integrate geological, tectonic and metallogenetic data, including new propose a regional model for the gold (and base metal) mineralization in south Amazonian Craton support mineral exploration concerning magmatic–hydrothermal deposits. The Proterozoic evolution of comprises accretion terrains Archean Carajás Mineral Province. In Tapajós Juruena provinces, located at p...

2006
Liberios VOKOROKOS Anton BALÁŽ Martin CHOVANEC

The goal of the article is to presents intrusion detections systems and design architecture of intrusion detection based on neural network self organizing map. In the report is described base problematic of neural network and intrusion detection system. The article further deals with specific design of intrusion detection architecture based on user anomaly behavior. A core of the designed archi...

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

2005
Konstantinos Xinidis Kostas G. Anagnostakis Evangelos P. Markatos

Network intrusion prevention systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion prevention systems have difficulty in handling high speed links. This paper describes the design and implementation of a high-performance network intrusion prevention system that...

2007
Salvatore J. Stolfo Philip K. Chan Dave Fan Wenke Lee Andreas Prodromidis

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید