نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

2007
Midori ASAKA Atsushi Taguchi

At the Information-technology Promotion Agency (IPA), we have been developing a network intrusion detection system we have named IDA (for the Intrusion Detection Agent system). IDA has two distinctive features that most conventional intrusion detection systems lack. The rst feature is a mechanism for tracing the origin of the break-in by means of mobile agents. The second feature is the way in ...

2015
M. N. S. Lakshmi M. Naga Surya Lakshmi Dorothy Denning

In recent years the security in data mining applications has become crucial in protecting public and private computing systems. Contemporary computing applications are facing numerous complex problems related to various internal or external attacks. This paper mainly focuses on a comprehensive study on Intrusion Detection systems. In modern world of security many researchers have proposed vario...

Journal: :The Journal of the Geological Society of Japan 1966

Journal: :Mineralium Deposita 2021

The Bolivian tin belt is a metallogenic province in the Eastern Cordillera of Andes known for its Sn, W, Ag, and base metal deposits. Cassiterite, which major constituent many magmatic-hydrothermal ore deposits from belt, can incorporate dozens elements within crystal lattice, making it useful geological tracer mineral also potential host critical elements. New U-Pb dating cassiterite yields La...

Journal: :Dalton transactions 2016
Ismail Khay Gérald Chaplais Habiba Nouali Guillaume Ortiz Claire Marichal Joël Patarin

The energetic performances of seven SOD or RHO-topology ZIFs, with zinc or cobalt metal cation (ZIF-8, ZIF-90, Zn(dcim)2-SALE, ZIF-67, ZIF-7, ZIF-71, ZIF-11) were evaluated using water intrusion-extrusion under high pressure. The relationship between the structural parameters (in particular the pore system SOD or RHO, the type of linker, the metal cation nature) and the intrusion pressure was s...

Journal: :IEICE Transactions 2006
Jun Zheng Mingzeng Hu

Machine learning and data mining algorithms are increasingly being used in the intrusion detection systems (IDS), but their performances are laggard to some extent especially applied in network based intrusion detection: the larger load of network traffic monitoring requires more efficient algorithm in practice. In this paper, we propose and design an anomaly intrusion detection (AID) system ba...

2015
Patrik Lif Teodor Sommestad

Intrusion detection systems are common in contemporary enterprises. These systems are sometimes operated by a single individual as a part time activity; they are sometimes operated by cyber security operation centres in which a group of technology experts with the sole task of monitoring, detecting, analysing and responding to threatening events in the computer network. In either case, human fa...

2012

Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the States Government assumes no liability for its contents or use thereof. If trade or manufacturers' names or products are mentioned, it is because they are considered essential to the object of the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید