نتایج جستجو برای: intrusion
تعداد نتایج: 18427 فیلتر نتایج به سال:
The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...
With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. It is becoming more demanding due to increasing network traffic and data on Internet. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not co...
The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and i...
This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to rec...
Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life. An Intrusion Detection is an important in assuring security of network and its different resourses. Intrusion detection attempts to detect computer attacks by examining various data records observed in processes on the network. Recently data mining metho...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. However, damage could have occurred before an intrusion is detected. In many computing systems the requirement for a high degree of soundness of intrusion reporting can yield poor performance in ...
session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...
Bio: Christopher Wee is a Researcher in the Computer Security Group at the University of California, Davis, Computer Science Department. His current research interests are intrusion detection, security auditing and Formal policy specifications. Chris has participated in three intrusion detection systems projects: DIDS, a LAN intrusion detection system, GrIDS: a wide-area IDS, and LAFS: a file-s...
A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...
OBJECTIVES To comparatively evaluate the extrusive forces and torquing moments on the posterior dentition generated during anterior intrusion with different intrusion techniques in the maxillary and mandibular dental arch. MATERIAL AND METHODS Seven wire specimens were used for each of the following intrusive arches: Utility arch 0.016 x 0.016' Blue Elgiloy, Utility arch 0.017 x 0.025' TMA an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید