نتایج جستجو برای: intrusion related deposits

تعداد نتایج: 1209151  

2013
Meghann F.I. Decker

Blocks of acid sulfate altered rock ejected from Halema`uma`u crater in the March 2008 eruption provide evidence of deeper processes that are driving the shallow hydrothermal alteration in this area. Previous work shows that the surficial alteration is dominated by remnant opal (SiO2) and anatase (TiO2), which are compositionally similar to materials found at Home Plate on Mars. The opal deposi...

Journal: :journal of mining and environment 2011
r. ghavami-riabi h.f.j. theart

the massive sulphide deposit at kantienpan cu-zn mine is hosted by volcano sedimentary succession known as the areachap group, in the eastern part of namaqua metamorphic province, south africa. the deposits were affected by a complex deformation and metamorphic history and represent examples of upper amphibolite to granulite grade metamorphosed volcanic-hosted massive sulphide (vhms) depo...

Journal: :Journal of anthropological sciences = Rivista di antropologia : JASS 2015
Marcos García-Diez Daniel Garrido Dirk Hoffmann Paul Pettitt Alistair Pike Joao Zilhão

The hand stencils of European Paleolithic art tend to be considered of pre-Magdalenian age and scholars have generally assigned them to the Gravettian period. At El Castillo Cave, application of U-series dating to calcite accretions has established a minimum age of 37,290 years for underlying red hand stencils, implying execution in the earlier part of the Aurignacian if not beforehand. Togethe...

Journal: :CoRR 2010
Mehdi Bahrami Mohammad Bahrami

Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-base...

2011
Bhawana Pillai Uday Pratap Singh

Most anomaly based NIDS employ supervised algorithms, whose performances highly depend on attack-free training data. Moreover, with changing network environment or services, patterns of normal traffic will be changed. In this paper, we developed intrusion detection system is to analyses the authentication records and separate UNFEIGNED and fraudulent authentication attempts for each user accoun...

Journal: :Science of Sintering 2022

Diatomite (diatomaceous earth) and clay minerals deposits from the mining basin Kolubara, Serbia, are natural materials with high economic potential in many fields. As received treated materials, diatomite were characterized using X-ray diffraction, mercury intrusion porosimetry, particle size distribution, scanning electron microscopy, Fourier-transform infrared spectroscopy. Activity concentr...

2001
Houda Labiod Karima Boudaoud

In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...

2004
Nataliya V. Bondarenko James W. Head

[1] We have analyzed the radar-dark parabola deposits associated with impact craters on the surface of Venus using the results of the Magellan radio experiments in both passive and active modes. The extent of mantle deposits is found to be much wider than the dark features observed in synthetic aperture radar (SAR) images. Using the emissivity data, we have classified features coinciding with t...

2014
Anurag Jain Bhupendra Verma J. L. Rana

In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that cl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید