نتایج جستجو برای: intrusion related deposits
تعداد نتایج: 1209151 فیلتر نتایج به سال:
After an intrusion has propagated between hosts, or even between networks, determining the propagation path is critical to assess exploited network vulnerabilities, and also to determine the vector and intent of the initial intrusion. This work proposes a novel method for malware intrusion attack path reconstruction that extends post-mortem system state comparison methods with network-level cor...
Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional intrusion detection systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap analysis of contemporary IDSs from a smart grid perspective. This ...
OBJECTIVE To determine the distributions of basal laminar and basal linear deposits in Bruch membrane (BM) with respect to age and early age-related maculopathy (ARM). METHODS The foveas of 41 human eyes (<60 years [n = 9]; > or =60 years [n = 32]), preserved no later than 3.5 hours post mortem, were examined using light and electron microscopy. Ten eyes met histopathologic criteria of the Al...
The site under study covers an area of 273 km in the Oristano plain on the west coast of Sardinia (Italy). Since 1950 the plain, formed during the Quaternary by alluvial deposits, has been under intensive cultivation and is an important dairy farming centre. In the coastal region, the large number of wells (25,000 tapped and not) some very close to each other, has resulted in over-exploitation ...
Current intrusion detection systems (IDSs) usually focus on detecting low-level attacks and/or anomalies; none of them can capture the logical steps or attack strategies behind these attacks. Consequently, the IDSs usually generate a large amount of alerts. In situations where there are intensive intrusive actions, not only will actual alerts be mixed with false alerts, but the amount of alerts...
The southern part of the West African Craton includes Baoulé-Mossi Domain, world’s premier Paleoproterozoic gold province (~10,000 metric ton endowment). Structural, metamorphic, and geochronological data suggest mineralisation occurred during three episodes that span much Eoeburnean Eburnean orogenic cycles. rare skarn-hosted deposits formed between ca. 2200 2135 Ma repeated volcanism, plutoni...
Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intrusion Prevention System are the reliable techniques for a Good security. Any detected intrusion is based on data collection. So, the collection of an important and significant tr...
Intrusion is a set of related activities which is performed to provide unauthorized activities such as access to the useful information, file modification etc. It is a set of any actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. Intrusion Detection Systems (IDS) are used to monitor and detect the probable attempts of such types. An IDS co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید