نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

Journal: :dental research journal 0
mostafa abtahi neda eslami reza zare mahmoud abadi saber pooria rezaei

background: there is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. the aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults. materials and methods: patients referred to the department of orthodontics of mashhad university of medical sciences participated in this study. ...

2013
Sherif M. Badr

Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that th...

Journal: :JNW 2013
Xufei Zheng Yonghui Fang Yanhui Zhou Jing Zhang

Today network security has become an everyday problem with virtually all computers connected to the Internet. Intrusion detection serves the important function of identifying malicious activities and determining their nature, origin, and seriousness. Inspired by the many excellent characteristics of biological immune System (BIS), the network intrusion detection system (NIDS) which based on art...

Journal: :CoRR 2012
Heba Ezzat Ibrahim Sherif M. Badr Mohamed A. Shaheen

Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this work, A multi-layer intrusion detection model is designed and developed to achieve high efficiency and improve the detection and classification rate a...

Journal: :J. Inf. Sci. Eng. 2001
Yao-Tsung Lin Shian-Shyong Tseng Shun-Chieh Lin

Due to the rapid growth of networked computer resources and the increasing importance of related applications, intrusions which threaten the infrastructure of these applications have are critical problems. In recent years, several intrusion detection systems designed to identify and detect possible intrusion behaviors. In this work, an intrusion detection model is proposed to for building an in...

Journal: :Journal of Systems and Software 2007
Lih-Chyau Wuu Chi-Hsiang Hung Sout-Fong Chen

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a col...

2002
Sergey Parilov Wolfgang Stuerzlinger

In this paper we present an Image-Based Rendering method for post-warping LDI’s in real-time on existing systems. The algorithm performs accurate splatting at low computational costs, reduces memoryaccess bottlenecks, enables us to trade-off the quality for the speed, and is simple to implement.

2000
Oliver Bastert Christian Matuszewski

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید