نتایج جستجو برای: overflow detection
تعداد نتایج: 572254 فیلتر نتایج به سال:
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. a large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. however, a usual aspect among them is to consider the common behavio...
In offshore drilling, accidents such as gas invasion, overflow, and kicks are unavoidable, they can escalate into blowouts other catastrophic events, resulting in casualties significant economic losses. Therefore, ensuring drilling safety requires precise monitoring of invasion overflow. Currently, most overflow methods used at sites based on threshold criteria. However, the parameters obtained...
Newtown Creek is an industrial waterway and former tidal wetland in New York City. It is one of the most polluted water bodies in the United States and was designated as a superfund site in 2010. For over a century, organic compounds, heavy metals, and other forms of industrial pollution have disrupted the creek’s environment. The creek is also impacted by discharges from twenty combined sewer ...
Combining the computational fluid dynamics (CFD) and the design of experiments (DOE) methods, as a mixed approach in modeling was proposed so that to simultaneously benefit from the advantages of both modeling methods. The presented method was validated using a coal hydraulic classifier in an industrial scale. Effects of operating parameters including feed flow rate, solid content and baffle le...
This paper demonstrates that it is possible to model attacks with a low number of states and classify them using Hidden Markov Models with very low False Alarm rate and very few False Negatives. We also show that the models developed can be used for both detection and classification. We put emphasis on detection and classification of network intrusions and attacks using Hidden Markov Models and...
This paper demonstrates that it is possible to model attacks with a low number of states and classify them using Hidden Markov Models with very low False Alarm rate and very few False Negatives. We also show that the models developed can be used for both detection and classification. We put emphasis on detection and classification of network intrusions and attacks using Hidden Markov Models and...
Repeated administration of methamphetamine (METH) to animals can result in long-lasting decreases in striatal dopamine (DA) content. In addition, the evoked overflow of striatal DA is reduced in rats 1 week after neurotoxic doses of METH. However, whether these functional changes in DA release are permanent or tend to recover over time has not been established. In the present study we used in v...
In a cellular phone system, the service area is partitioned into several location areas (LA’s). Every LA is associated with a mobility database called visitor location register (VLR). When a mobile user enters an LA, the user must register to the VLR before receiving any cellular service. If the VLR is full, the registration procedure fails and the system cannot deliver services to the user und...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید