نتایج جستجو برای: intrusion related deposits
تعداد نتایج: 1209151 فیلتر نتایج به سال:
Blocks of acid sulfate altered rock ejected from Halema`uma`u crater in the March 2008 eruption provide evidence of deeper processes that are driving the shallow hydrothermal alteration in this area. Previous work shows that the surficial alteration is dominated by remnant opal (SiO2) and anatase (TiO2), which are compositionally similar to materials found at Home Plate on Mars. The opal deposi...
the massive sulphide deposit at kantienpan cu-zn mine is hosted by volcano sedimentary succession known as the areachap group, in the eastern part of namaqua metamorphic province, south africa. the deposits were affected by a complex deformation and metamorphic history and represent examples of upper amphibolite to granulite grade metamorphosed volcanic-hosted massive sulphide (vhms) depo...
The hand stencils of European Paleolithic art tend to be considered of pre-Magdalenian age and scholars have generally assigned them to the Gravettian period. At El Castillo Cave, application of U-series dating to calcite accretions has established a minimum age of 37,290 years for underlying red hand stencils, implying execution in the earlier part of the Aurignacian if not beforehand. Togethe...
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-base...
Most anomaly based NIDS employ supervised algorithms, whose performances highly depend on attack-free training data. Moreover, with changing network environment or services, patterns of normal traffic will be changed. In this paper, we developed intrusion detection system is to analyses the authentication records and separate UNFEIGNED and fraudulent authentication attempts for each user accoun...
Diatomite (diatomaceous earth) and clay minerals deposits from the mining basin Kolubara, Serbia, are natural materials with high economic potential in many fields. As received treated materials, diatomite were characterized using X-ray diffraction, mercury intrusion porosimetry, particle size distribution, scanning electron microscopy, Fourier-transform infrared spectroscopy. Activity concentr...
In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...
[1] We have analyzed the radar-dark parabola deposits associated with impact craters on the surface of Venus using the results of the Magellan radio experiments in both passive and active modes. The extent of mantle deposits is found to be much wider than the dark features observed in synthetic aperture radar (SAR) images. Using the emissivity data, we have classified features coinciding with t...
In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that cl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید