نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

2011
Ahmed F. Shosha Joshua James Pavel Gladyshev

After an intrusion has propagated between hosts, or even between networks, determining the propagation path is critical to assess exploited network vulnerabilities, and also to determine the vector and intent of the initial intrusion. This work proposes a novel method for malware intrusion attack path reconstruction that extends post-mortem system state comparison methods with network-level cor...

2011
Nishchal Kush Ernest Foo Ejaz Ahmed Irfan Ahmed Andrew Clark

Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional intrusion detection systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap analysis of contemporary IDSs from a smart grid perspective. This ...

Journal: :Archives of ophthalmology 1999
C A Curcio C L Millican

OBJECTIVE To determine the distributions of basal laminar and basal linear deposits in Bruch membrane (BM) with respect to age and early age-related maculopathy (ARM). METHODS The foveas of 41 human eyes (<60 years [n = 9]; > or =60 years [n = 32]), preserved no later than 3.5 hours post mortem, were examined using light and electron microscopy. Ten eyes met histopathologic criteria of the Al...

2004
Pierluigi CAU

The site under study covers an area of 273 km in the Oristano plain on the west coast of Sardinia (Italy). Since 1950 the plain, formed during the Quaternary by alluvial deposits, has been under intensive cultivation and is an important dairy farming centre. In the coastal region, the large number of wells (25,000 tapped and not) some very close to each other, has resulted in over-exploitation ...

2002
Peng Ning Yun Cui

Current intrusion detection systems (IDSs) usually focus on detecting low-level attacks and/or anomalies; none of them can capture the logical steps or attack strategies behind these attacks. Consequently, the IDSs usually generate a large amount of alerts. In situations where there are intensive intrusive actions, not only will actual alerts be mixed with false alerts, but the amount of alerts...

Journal: :Mineralium Deposita 2021

The southern part of the West African Craton includes Baoulé-Mossi Domain, world’s premier Paleoproterozoic gold province (~10,000 metric ton endowment). Structural, metamorphic, and geochronological data suggest mineralisation occurred during three episodes that span much Eoeburnean Eburnean orogenic cycles. rare skarn-hosted deposits formed between ca. 2200 2135 Ma repeated volcanism, plutoni...

2016
Azidine GUEZZAZ Ahmed ASIMI Yassine SADQI Younes ASIMI

Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intrusion Prevention System are the reliable techniques for a Good security. Any detected intrusion is based on data collection. So, the collection of an important and significant tr...

2014
Samarjeet Borah Anindita Chakraborty

Intrusion is a set of related activities which is performed to provide unauthorized activities such as access to the useful information, file modification etc. It is a set of any actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. Intrusion Detection Systems (IDS) are used to monitor and detect the probable attempts of such types. An IDS co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید