نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

Journal: :Neurology 2006
Kevin R Nelson Michelle Mattingly Sherman A Lee Frederick A Schmitt

The neurophysiologic basis of near death experience (NDE) is unknown. Clinical observations suggest that REM state intrusion contributes to NDE. Support for the hypothesis follows five lines of evidence: REM intrusion during wakefulness is a frequent normal occurrence, REM intrusion underlies other clinical conditions, NDE elements can be explained by REM intrusion, cardiorespiratory afferents ...

2011
Hemant H. Patel Ketan J. Sarvakar

In this paper, we have presented a survey on the different data mining technique of intrusion detection which is basically used for the intrusion detection purpose in the field of data mining. Today intrusion detection in data mining has gain more interest to the researches, there are many intrusion detection issues in data mining like dos attacks, R2L, U2R and probing etc. There are many algor...

2017
Stuti Tiwari Amit Dubey

Detection of intrusion in network is necessary since the intrusion may create harm or attack any application which needs to be detected and prevented. Although there are various algorithms implemented for the detection of intrusions, but the classification of these intrusion is also an important concern since the type of attack depends on the intrusion. Here in this paper a survey of all the In...

Journal: :CoRR 2007
Aikaterini Mitrokotsa Nikos Komninos Christos Douligeris

In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. Th...

2006
Liberios VOKOROKOS Anton BALÁŽ Martin CHOVANEC

The goal of the article is to presents intrusion detections systems and design architecture of intrusion detection based on neural network self organizing map. In the report is described base problematic of neural network and intrusion detection system. The article further deals with specific design of intrusion detection architecture based on user anomaly behavior. A core of the designed archi...

2004
Ja-Min Koo Sung-Bae Cho

As the computer environment changes significantly, several mechanisms such as firewall are developed and intrusion detection system (IDS) is the representative among them. However, because many IDSs are modeled and evaluated with known intrusion patterns, they have inertia not to detect the intrusions which are unknown or transformed. In this paper, we propose an IGA-based method to generate th...

2004
Sandhya Peddabachigari Ajith Abraham

Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection is a mechanism of providing security to computer networks. Although there are some existing mechanisms for Intrusion detection, there is need to improve the performance. Data mining techniques are a new approach for Intrusion detection. In this paper we investigate and ev...

2010
Liberios VOKOROKOS Anton BALÁŽ Branislav MADOŠ

In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...

2012
Navita Sharma Gurpreet Singh

The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...

A Fatahi-Vajari A. Imam,

This paper investigates the lateral vibration of single-layered graphene sheets based on a new theory called doublet mechanics with a length scale parameter. After a brief reviewing of doublet mechanics fundamentals, a sixth order partial differential equation that governs the lateral vibration of single-layered graphene sheets is derived. Using doublet mechanics, the relation between natural f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید