نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2011
Manish Kumar

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

2014
Kamini Nalavade B. B. Meshram T. M. Khoshgoftaar C. Seiffert

With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. It is becoming more demanding due to increasing network traffic and data on Internet. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not co...

2012
Besma Othmani Mohsen Machhout Houcine Mejri Rached Tourki

The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and i...

Journal: :CoRR 2009
Farah Jemili Montaceur Zaghdoud Mohamed Ben Ahmed

This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to rec...

2014
Ravinder Reddy B. Kavya Y Ramadevi Dong Seong Kim Ha-Nam Nguyen Jong Sou Park Hansung Lee Jiyoung Song Daihee Park

Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An Intrusion Detection is an important in assuring security of network and its different resourses. Intrusion detection attempts to detect computer attacks by examining various data records observed in processes on the network. Recently data mining metho...

Journal: :Journal of Computer Security 1999
Peng Liu Sushil Jajodia Catherine D. McCollum

System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. However, damage could have occurred before an intrusion is detected. In many computing systems the requirement for a high degree of soundness of intrusion reporting can yield poor performance in ...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

1999
Christopher Wee

Bio: Christopher Wee is a Researcher in the Computer Security Group at the University of California, Davis, Computer Science Department. His current research interests are intrusion detection, security auditing and Formal policy specifications. Chris has participated in three intrusion detection systems projects: DIDS, a LAN intrusion detection system, GrIDS: a wide-area IDS, and LAFS: a file-s...

2006
Matthew Bishop Xin Liu Chin-Yang Henry Tseng

A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...

Journal: :Orthodontics & craniofacial research 2009
I Sifakakis N Pandis M Makou T Eliades C Bourauel

OBJECTIVES To comparatively evaluate the extrusive forces and torquing moments on the posterior dentition generated during anterior intrusion with different intrusion techniques in the maxillary and mandibular dental arch. MATERIAL AND METHODS Seven wire specimens were used for each of the following intrusive arches: Utility arch 0.016 x 0.016' Blue Elgiloy, Utility arch 0.017 x 0.025' TMA an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید