نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

2007
Pedro García-Teodoro Jesús E. Díaz-Verdejo Gabriel Maciá-Fernández

This paper presents some proposals and contributions in network-based intrusion-related technologies. Two key points are discussed in this line: anomaly-based intrusion detection, and active response mechanisms. The first issue is mainly focused on the consideration of a stochastic approach to model the normal behavior of the network system to be monitored and protected. This anomaly-based dete...

Journal: :Ground water 2013
Johanna Lofi Philippe Pezard Frédéric Bouchette Olivier Raynal Pierre Sabatier Nataliya Denchik Arnaud Levannier Laurent Dezileau Raphaël Certain

Most of the Mediterranean coastal porous aquifers are intensively exploited. Because of climatic and anthropogenic effects, understanding the physical and geological controls on groundwater distribution and flow dynamics in such aquifers is crucial. This study presents the results of a structural investigation of a system located along the coastline of the Gulf of Lions (NW Mediterranean). A ke...

The Miocene Qohrud granitoid intrusion consists of granite, granodiorite and tonalite and is located in the Urmia-Dokhtar magmatic belt. Intrusion of magmatic rocks into the various sedimentary rocks including shale, sandstone, limestone and marl, with Jurassic to Eocene age, has caused contact metamorphism of the surrounded rocks. Varity of hornfelses and skarns are formed in this regards. Hyd...

2013
Hyeokchan Kwon Sin-Hyo Kim

In this paper, we present mobile device classification mechanism for preventing wireless intrusion efficiently. Current wireless intrusion prevention system classifying the mobile devices into three or four categories: authorized, unauthorized, guest and external. By contrast, the proposed mechanism classified mobile devices into 9 categories. For a variety of device classification, the propose...

Journal: :International Journal of Information Security 2001

Journal: Desert 2018
H. Ghasemieh, I.D. Clark M. Mirzavand R. Bagheri S.J. Sadatinejad

Owing to population growth and water demand, coastal aquifers all over the world are over–pumped, resulting in serious problems such as saltwater intrusion. So, in these conditions, assessing the groundwater system’s vulnerability and finding areas with saltwater intrusion potential are vital for the better management of aquifers. In this study, AHP-GALDIT was applied to saltwater intrusion vul...

Journal: :Retina 2013
Christine A Curcio Jeffrey D Messinger Kenneth R Sloan Gerald McGwin Nancy E Medeiros Richard F Spaide

PURPOSE To characterize the morphology, prevalence, and topography of subretinal drusenoid deposits, a candidate histological correlate of reticular pseudodrusen, with reference to basal linear deposit (BlinD), a specific lesion of age-related macular degeneration, and to propose a biogenesis model for both lesion. METHODS Donor eyes with median death-to-preservation of 2:40 hours were postfi...

2016
Sung Woo Lee Mi-Yeon YU Seon Ha Baek Shin-Young Ahn Sejoong Kim Ki Young Na Dong-Wan Chae Ho Jun Chin Jeff M Sands

BACKGROUND AND OBJECTIVES There has been little published information on risk factors for poor long-term outcome in adult biopsy-proven minimal change disease (MCD). METHODS Data from sixty-three adult, biopsy-proven primary MCD patients treated at a tertiary university hospital between 2003 and 2013 were analyzed. Baseline clinical and pathologic factors were assessed for the associations wi...

2012
K. P. Kaliyamurthie R. M. Suresh

Communication network is facilitated with different protocol. Each protocol supported to increase the network performance in a secured manner. In communication process, user’s connectivity, violations of policy on access of information are handles through intrusion. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. It focus...

2006
Huang-Chun Roan Chien-Min Ou Wen-Jyi Hwang Dan Chia-Tien Lo

A novel architecture for a hardware-based network intrusion detection system (NIDS) is presented in this paper. The system adopts an FPGA-based signature match co-processor as a core for the NIDS. The signature matcher is based on an algorithm that employs simple shift registers, or-gates, and ROMs in which patterns are stored. As compared with related work, experimental results show that the p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید