نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

2009
E. E. Brodsky C. D. Rowe F. Meneghini J. C. Moore

[1] The absolute value of stress on a fault during slip is a critical unknown quantity in earthquake physics. One of the reasons for the uncertainty is a lack of geological constraints in real faults. Here we calculate the slip rate and stress on an ancient fault in a new way based on rocks preserved in an unusual exposure. The study area consists of a fault core on Kodiak Island that has a ser...

2015
Wenbin Xu Joël Ruch Sigurjón Jónsson

Submarine eruptions that lead to the formation of new volcanic islands are rare and far from being fully understood; only a few such eruptions have been witnessed since Surtsey Island emerged to the south of Iceland in the 1960s. Here we report on two new volcanic islands that were formed in the Zubair archipelago of the southern Red Sea in 2011-2013. Using high-resolution optical satellite ima...

2010
Pedro Salgueiro Salvador Abreu Miguel P. Correia

In this work we present a domain specific language for network intrusion detection that allows to describe network intrusions composed by several network packets, using a declarative approach to describe the desirable network situations, and based on that description, a set of parameterizations for network intrusion detection mechanisms based on Constraint Programming(CP) will execute to find t...

2004
Luis Sardinha Nuno Ferreira Neves Paulo Veríssimo

Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be very tempting for a hacker because they can be used, for example, to break pass-phrases with brute-force attacks or to launch distributed denial of service attacks to a given target. In this paper, we explain how malici...

2004
Stefan Axelsson

Despite several years of intensive study, intrusion detection systems still suffer from a key deficiency: A high rate of false alarms. To counteract this, this paper proposes to visualise the state of the computer system such that the operator can determine whether a violation has taken place. To this end a very simple anomaly detection inspired log reduction scheme is combined with graph visua...

2006
Stephan Neuhaus Andreas Zeller

When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those processes automatically. In contrast to other methods that help analyze attacks, Malfor works by experiments: first, we record the interaction of the system under attack; after the intrusion has been detected, we replay the rec...

2012
Mohammed Chennoufi Fatima Bendella

This paper describes how multi-agent systems can help to solve a complex problem such as security and more precisely intrusion detection. Intrusion Detection System (I.D.S) is a component of the security infrastructure designed to detect violations of security policy. Most of the intrusions can be localized either by considering of models "pattern" of user activities (non-behavioral approach) o...

Journal: :Memory & cognition 2008
Andrew C Butler Henry L Roediger

Multiple-choice tests are used frequently in higher education without much consideration of the impact this form of assessment has on learning. Multiple-choice testing enhances retention of the material tested (the testing effect); however, unlike other tests, multiple-choice can also be detrimental because it exposes students to misinformation in the form of lures. The selection of lures can l...

2017
David Tolpin

We present a probabilistic model of an intrusion in a marked renewal process. Given a process and a sequence of events, an intrusion is a subsequence of events that is not produced by the process. Applications of the model are, for example, online payment fraud with the fraudster taking over a user’s account and performing payments on the user’s behalf, or unexpected equipment failures due to u...

In the area SW of Arak, intrusives are emplaced into metasediments of early Mesozoic age. The intrusive rocks vary in morphology, structure and mineralogy, and exhibit various degrees of alterations; Rb-Sr geochronological data have been obtained to constrain their timing. There are three different groups of granitic rocks in the area: (a) the Astaneh intrusion, consisting of granite, biotite g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید