نتایج جستجو برای: intrusion
تعداد نتایج: 18427 فیلتر نتایج به سال:
In this paper we propose a framework for intrusion detection called Fuzzy Agent-Based Intrusion Detection. A unique feature of our model is that the agents use the fuzzy logic to process log files. This reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation. Key-Words: intrusion detection, ...
The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. In this paper we have made an effort to document related issues and challenges of intrusion detection system for wireless sensor network and proposed a novel secure strategy for their implementation that can detect possible intrusion in the network, alerting user after intrusion h...
Sarvian intrusion is located in northeast of Delijan in the Orumieh-Dokhtar magmatic belt. Sarvian pluton consists of acidic and intermediate units and is composed of granite, granodiorite, tonalite and quartz-diorite. Main minerals of the intrusion are plagioclase, amphibole, biotite, quartz and K-feldspar. In this research, based on the EPMA analyses, thermobarometry of the rocks investigated...
Intrusion detection systems continuously watch the activity on a network or computer, looking for attack and intrusion evidences. However, host-based intrusion detectors are particularly vulnerable, as they can be disabled or tampered by successful intruders. This work proposes and implements an architecture model aimed to protect host-based intrusion detectors, through the application of the v...
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a cri...
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
Overutilization of groundwater resources can put their quality under stress. It could be base on rapid declination in groundwater level leading to salt water intrusion in the coastal aquifers. The objective of this study was to map the vulnerability of salt water intrusion of the Urmia Lake, Iran to nearby coastal aquifer (Azarshahr) using GALDIT method. The GALDIT index based on six parameters...
In this study, abstraction, desalination and recharge method and SEAWAT numerical model are used to investigate seawater intrusion repulsion in a hypothetical two-dimensional coastal aquifer to understand the relation of seawater intrusion with abstraction, desalination and recharge parameters (i.e. abstraction/recharge rate, wells distance and depth). Abstraction, desalination and recharge con...
Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...
Intrusions in computing environment are a very common undesired malicious activity that is going on since the inception of computing resources. A number of security measures have taken place for the last three decades, but as Technology has grown up, so as the security threats. With the whole world depending on computers, being directly or indirectly, it is a very important issue to prevent the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید