نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

2002
Paulo Veríssimo Nuno Ferreira Neves Miguel Correia

There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the oth...

Journal: :Journal of clinical epidemiology 2004
A Cecile J W Janssens Pieter A van Doorn Josien B de Boer Frans G A van der Meché Jan Passchier Rogier Q Hintzen

OBJECTIVE The aim of the study was to investigate the impact of perception of prognostic risk on anxiety, depression, and disease-related distress in patients with multiple sclerosis (MS). STUDY DESIGN AND SETTING Perceived risk and perceived seriousness of the 2-year, 10-year, and lifetime prognosis of wheelchair dependence, disability status, anxiety, depression, and disease-related distres...

Journal: :Minerals 2023

The East Kunlun Orogenic Belt is considered as one of the important gold mineralization regions in Tethys tectonic domain. These orogenic deposits are related to intermediate-acid intrusions formed at end Paleo-Tethys evolution, but petrogenesis controversial. This paper presents a new study on geochemistry zircon U-Pb, O, S, and Pb isotopic compositions Asiha quartz diorite, granite porphyry, ...

2013
R. Ganesan Arul Lawrence Selvakumar

Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administr...

1999
Derek A. Brown Robert Cameron

This paper describes occurrences of low grade, disseminated gold in sedimentary rocks and alkalic intrusions in the vicinity of the Howell Creek Structure (HCS; Price,1964) of southeastern British Columbia. The study is part of the B.C. Geological Survey’s ongoing Sediment-hosted Gold Project, which is examining occurrences throughout the province which may have similarities to gold deposits in...

Journal: :Vision Research 1995
M. Kliffen J.G.M. Huijmans C. M. Mooy T. M. Luider S. Kerkvliet P.T.V.M. De Jong

We investigated the presence and localization of glycosaminoglycans in basal laminar deposit and drusen in age-related maculopathy. Conventional histological staining techniques and monoclonal antibodies specific for several glycosaminoglycans were used on paraffin-embedded human maculae. Furthermore, macular homogenates were analyzed with two-dimensional electrophoresis. Quantitative analysis ...

Journal: :زمین شناسی اقتصادی 0
بتول تقی پور محمد علی مکی زاده

the study area is a part of cenozoic magmatic belt of central iran, which is located in the west of yazd porovince. contact metamorphism and skarn occurred in conglomerate part of sngestan formation. the oligocene intrusion bodies of ali-abad-darreh zereshk are leucocerate and have the chemical composition of granite to granodiorite with calc-alkaline affinity from volcanic arc geological setti...

Journal: :IJCSA 2009
Hayoung Oh Inshil Doh Kijoon Chae

Detecting network intrusion has been not only important but also difficult in the network security research area. In Medical Sensor Network(MSN), network intrusion is critical because the data delivered through network is directly related to patients’ lives. Traditional supervised learning techniques are not appropriate to detect anomalous behaviors and new attacks because of temporal changes i...

Journal: :I. J. Network Security 2010
Aikaterini Mitrokotsa Nikos Komninos Christos Douligeris

In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information that must be exchanged between nodes. In particular, we exploit information visualization and machine learning techniques in order to achieve efficient and effective intrusion de...

Journal: :Computers & Security 1993
Teresa F. Lunt

Intrusion detection is an alternative to the situation of the security violation.Security mechanism of the network is necessary against the threat to the system. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. This paper describes a brief overvie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید