نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2013
P. Amudha S. Karthik S. Sivakumari

Security is becoming a critical part of organizational information systems and security of a computer system or network is compromised when an intrusion takes place. In the field of computer networks security, the detection of threats or attacks is nowadays a critical problem to solve. Intrusion Detection Systems (IDS) have become a standard component in network security infrastructures and is ...

2013
Bin Zeng Lu Yao Rui Wang

A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detecti...

Journal: :Frontiers in Earth Science 2022

Knowledge of the formation mechanisms and geometries fracture systems in sedimentary rocks is crucial for understanding local basin-scale fluid migration. Complex networks can be caused by, instance, forced folding a competent sediment layer response to magmatic sill intrusion, remobilisation fluidized sand or overpressure underlying porous reservoir formations. The opening modes fractures main...

Journal: :IJICS 2007
Natalia Stakhanova Samik Basu Johnny S. Wong

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively...

2015
J. K. Kalita

Consequently, Intrusion Detection Systems (IDS) are quickly becoming a Intrusion Detection System Using Ontology and Clustering Techniques, Book Title. NIDS solutions offer sophisticated, real-time intrusion detection capabilities often Though this method takes time to set up, as baselining requires the NIDS. State-of-the-art intrusion detection, prevention and reaction simulation systems analy...

Journal: :International Journal of Information Security and Privacy 2021

In order to improve the ability detect network attacks, traditional intrusion detection models often used convolutional neural networks encode spatial information or recurrent obtain temporal features of data. Some combined two methods extract spatio-temporal features. However, these approaches separate and learned insufficiently. This paper presented an improved model based on (TCN) attention ...

Journal: :Journal of Computer Security 2005
Meng Yu Peng Liu Wanyu Zang

It is important for critical applications to provide critical services without any integrity or availability degradation in the presence of intrusions. This requirement can be satisfied by intrusion masking techniques under some situations. Compared with intrusion tolerance techniques, where some integrity or availability degradations are usually caused, intrusion masking techniques use substan...

F. Moayyedian M. Kadkhodayan,

In this paper to predict the critical conditions for onset of elastic-plastic wrinkling of flange of a two-layered circular blank during the deep-drawing process a closed-form semi-analytical elastic-plastic solution using Tresca yield criterion alongwith deformation theory in plasticity with considernig the perfectly plastic behaviour of materials is presented. Simplifying the presented soluti...

The aim of this paper is to investigate adhesion property between nano-layered filler and the polymer matrix using a combination of experimental and micromechanical models as well as the changes in yield strength and stiffness of a layered silicate-filled epoxy nanocomposite. The results indicate that addition of intercalated layered silicate particles increased Young’s modulus and yield streng...

2009
Ruth Rendell

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید