نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

Journal: :Memory & cognition 2012
Jonathan F Miller Christoph T Weidemann Michael J Kahana

Although much is known about the dynamics of memory search in the free recall task, relatively little is known about the factors related to recall termination. Reanalyzing individual trial data from 14 prior studies (1,079 participants in 28,015 trials) and defining termination as occurring when a final response is followed by a long nonresponse interval, we observed that termination probabilit...

Journal: :JoWUA 2011
Carol J. Fung

Cyber intrusion is becoming an increasingly global and urgent problem. Intrusion Detection Systems (IDSs) are deployed to identify intrusions and mitigate their damage. A stand alone IDS does not have complete information or knowledge to detect intrusions. A Collaborative Intrusion Detection Network (CIDN) consists in a set of cooperating IDSs which use collective knowledge and experience to ac...

Journal: :IJISP 2010
Ran Tao Li Yang Lu Peng Bin Li

Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...

2013
R. Ganesan Arul Lawrence Selvakumar

Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administr...

2014
Shahul Kshirsagar S. R. Yadav

To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data packets and each packet has to scan for its detection. This paper works to develo...

2016
James E. Mungall Sandra L. Kamo Stewart McQuade

Layered intrusions represent part of the plumbing systems that deliver vast quantities of magma through the Earth's crust during the formation of large igneous provinces, which disrupt global ecosystems and host most of the Earth's endowment of Pt, Ni and Cr deposits. The Rustenburg Layered Suite of the enormous Bushveld Igneous Complex of South Africa has been presumed to have formed by deposi...

Journal: :Schizophrenia research 2006
Kenneth L Subotnik Keith H Nuechterlein Michael F Green William P Horan Tasha M Nienow Joseph Ventura Annie T Nguyen

The neurocognitive and social cognitive correlates of two types of formal thought disorder (i.e., bizarre-idiosyncratic and concrete thinking) were examined in 47 stable outpatients with schizophrenia. Both types of thinking disturbance were related to impairments in verbal learning, intrusions in verbal memory, immediate auditory memory, sustained attention, and social schema knowledge. Distra...

2014
Lauren M. Jozwiak James W. Head Lionel Wilson

Article history: Received 29 May 2014 Revised 8 October 2014 Accepted 12 October 2014 Available online 15 November 2014

2000
Diego Zamboni

Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where they run (sometimes even requiring a dedicated system) and are subject to tampering or disabling by an intruder. Additionally, intrusion detection systems have usually obtained information about host behavior through indirect means, such as audit t...

2018
Joost Asselbergs Marit Sijbrandij Evert Hoogendoorn Pim Cuijpers Lara Olie Kfir Oved Job Merkies Tessa Plooijer Simone Eltink Heleen Riper

Background: Vivid trauma-related intrusions are a hallmark symptom of posttraumatic stress disorder (PTSD), and may be involved in its onset. Effective interventions to reduce intrusions and to potentially prevent the onset of subsequent PTSD are scarce. Studies suggest that playing the videogame Tetris, shortly after watching aversive film clips, reduces subsequent intrusions. Other studies ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید