نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

Journal: :The International journal of prosthodontics 2015
Célia Regina Pinzan-Vercelino Júlio Araújo Gurgel Kellyne Rodrigues Carvalho Carollyne Mota Tiago Arnaldo Pinzan

PURPOSE This study aimed to evaluate the use of orthodontic mini-implants for the intrusion of supraerupted maxillary molars. MATERIALS AND METHODS Nine patients were treated using buttons bonded on dental surfaces and mini-implants inserted on the buccal and palatal sides. The intrusion was evaluated by comparing radiographs obtained at the start of treatment and at the end of intrusion. The...

2001
Andrew P. Moore

Fundamental to the Survivable Network Analysis (SNA) method, developed at the SEI [2], is the use of intrusion scenarios to improve the survivability of system designs. This position statement describes some relevant insights gained from applying SNA to several significant real-world systems. These insights help understand what is needed to use intrusion scenarios for security requirements engi...

2015
Liu Jing

IPv6 has enough IP addresses to solve the problem of lack of IP address space. However, there are many security problems to be concerned. The detection ability of current intrusion detection system is poor when given less priori knowledge. In this paper, we analyze the Least Squares Support Vector Machine (LS-SVM) algorithm and the working process of snort intrusion detection system. And then w...

2005
Xia Wang Tu-liang Lin

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people’s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitorin...

2013
Sharmila Kishor Wagh Vinod K. Pachghare Satish R. Kolhe

In today’s world, almost everybody is affluent with computers and network based technology is growing by leaps and bounds. So, network security has become very important, rather an inevitable part of computer system. An Intrusion Detection System (IDS) is designed to detect system attacks and classify system activities into normal and abnormal form. Machine learning techniques have been applied...

2010
LI Min

The article introduced the importance of intrusion detection, as well as the traditional intrusion detection's type and the limitation. Also, according to the intrusion detection's general process and data mining characteristic, it establishes a data mining-based model of network intrusion detection which is designed for its flaw. As a result, the missing report reduces greatly; the examination...

2008
Iftikhar Ahmad M. A Ansari Sajjad Mohsin

In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is...

2006
Gil-Han Kim Hyung-woo Lee

The existing well-known network based intrusion detection/ prevention techniques such as the misuse detection technique, etc, are widely used. However, because the misuse detection based intrusion prevention system is proportionally depending on the detection rules, it causes excessive large false alarm which is linked to wrong correspondence. This study suggests an intrusion prevention system ...

Journal: :Computer and Information Science 2009
Huawang Qin Yuewei Dai Zhiquan Wang

Intrusion tolerance is the rising third generation technology of network security. For the shortcomings of existing models, a model of intrusion tolerant system based on game theory is proposed. The intrusion tolerant system and the intruder are seen as the two sides of the game. The income functions of the two sides are designed basing on some given concepts. Through quantifying and analyzing ...

2005
Yao Li Zhitang Li Hao Tu

We have set up a project aiming at developing a dynamical immune intrusion detection system for IPv6 and protecting the next generation Internet from intrusion. We focus on investigating immunological principles in designing a dynamic multi-agent system for intrusion detection in IPv6 environment, instead of attempting to describe all that is intrusion in the network try and describe what is no...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید