نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

Journal: :JDCTA 2009
S. Janakiraman V. Vasudevan

Intrusion detection is a problem of great significance to protecting information systems security. An intruder may move between multiple nodes in the network to conceal the origin of attack. Distributed intrusion detection and prevention plays an increasingly important role in securing computer networks. To overcome the limitations of conventional intrusion detection systems, alerts are made in...

2008
Alireza Osareh Bita Shadgar

Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements; they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, machine learning-based intrusion detection systems have demonstrated high accuracy, good generalization to novel type...

Journal: :JNW 2013
Yanjun Long Jianquan Ouyang Xinwen Sun

Network intrusion detection is of great importance in the research field of information security in computer networks. In this paper, we concentrate on how to automatically detect the network intrusion behavior utilizing fuzzy support vector machine. After analyzing the related works of the proposed paper, we introduce the main characterics of fuzzy support vector machine, and demonstrate its f...

2007
Gregory J. Retallack

Unusually large and locally variable carbon isotope excursions coincident with mass extinctions at the end of the Permian Period (253 Ma) and Guadalupian Epoch (260 Ma) can be attributed to methane outbursts to the atmosphere. Methane has isotopic values (dC) low enough to reduce to feasible amounts the carbon required for isotopic mass balance. The duration of the carbon isotopic excursions an...

Journal: :European review for medical and pharmacological sciences 2015
F Perez-Ruiz L Punzi

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

Journal: :Economic geology and the bulletin of the Society of Economic Geologists 2021

Abstract Dongping is the largest Au-Te vein deposit (~120 t Au) in North China craton, but its age, origin, and setting remain unsolved. Here, we integrate paragenesis, geochemistry, situ U-Pb geochronology of garnet to constrain timing possible origin deposit. Gold mineralization at hosted Shuiquangou alkaline complex (ca. 401–390 Ma) dominated by quartz-sulfide veins with minor ores adjacent ...

Journal: :Acta dermato-venereologica 2014
Teea T Salmi Kaisa Hervonen Kaija Laurila Pekka Collin Markku Mäki Outi Koskinen Heini Huhtala Katri Kaukinen Timo Reunala

Dermatitis herpetiformis (DH) is an extraintestinal manifestation of coeliac disease. Untreated coeliac disease patients are known to have transglutaminase 2 (TG2)-targeted IgA deposits in the small bowel mucosa. To evaluate whether similar intestinal IgA deposits are also present in DH and whether the deposits disappear with gluten-free diet, 47 untreated and 27 treated DH patients were studie...

2006
María Bermúdez-Edo Rolando Salazar-Hernández Jesús E. Díaz-Verdejo Pedro García-Teodoro

One of the key challenges that researchers should face when proposing a new intrusion detection approach (IDS) is that of demonstrating its general validity. This fact goes necessarily through the disposal of a real set of intrusion (as well as non-intrusion) related events, from which to compare and thus validate the performance of the novel proposed techniques. However, this a priori simple i...

Journal: :RITA 2016
Felipe Cesar Costa Alves Ed Wilson Tavares Ferreira Valtemir Nascimento Ruy de Oliveira

The growing record of security incidents on computer networks has motivated the development of intrusion detection studies, the main identification techniques of intrusion are based on anomalies and signatures. Currently, the academic community explores preferably research on anomalies based networks, however, there is no common model to develop these proposals so that many authors describe, im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید