نتایج جستجو برای: outflow intrusions
تعداد نتایج: 23227 فیلتر نتایج به سال:
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on extending dramatically. Information Systems and Networks are subject to electronic attacks and the possibilities of intrusion are very high. An Intrusio...
A self-report measure of the emotional and behavioural reactions to intrusive thoughts was developed. The paper presents data that confirm the stability, reliability and validity of the new 7-item measure. Emotional and behavioural reactions to intrusions emerged as separate factors on the Emotional and Behavioural Reactions to Intrusions Questionnaire (EBRIQ), a finding confirmed by an indepen...
Intrusive memories are common following traumatic events and among the hallmark symptoms of posttraumatic stress disorder (PTSD). Most studies assess summarized accounts of intrusions retrospectively. We used an ecological momentary approach and index intrusive memories in trauma survivors with and without PTSD using electronic diaries. Forty-six trauma survivors completed daily diaries for 7 c...
Security Management is a key issue in distributed computer systems. Resources and data need to be protected against unauthorized access, manipulation and malicious intrusions that render a system unreliable or unusable. The complexity of the task calls for the design of intelligent support systems that aid system administrators in the detection and/or prevention of intrusions. For this purpose,...
Most of the Soft Computing algorithms will learn from human knowledge and mimic human skills. We survey the principal constituents of soft computing techniques including Fuzzy Logic, Artificial Neural Networks, Support Vector Machines, Probabilistic Reasoning, Genetic Algorithms and Multi-Variate Adaptive Regressive Splines. Soft Computing techniques are being widely used by the IDS community d...
Due to the increase in access of malicious data over the internet resources, intrusions Detection Systems (IDSs) have become the necessary component of the computer and information security framework. Although the field of IDSs is still developing, they are not able to detect all types of intrusions. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms ...
In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI { which is an certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discr...
Little is known about the how the decision is made to terminate memory search, though there have been several recent attempts to uncover this process. In one recent study, Miller et al. (2012), re-analyzed data from a large number of free-recall experiments and identified intrusions as a factor that influenced search termination decisions. One potential problem with this re-analysis is that all...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید