نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

Journal: :Minerals 2022

Controversy surrounds the genetic relationship between gold mineralization and magmatism, especially in deposits granite. Jiaodong Peninsula is leading province China, most are Mesozoic granites; moreover, debate on genesis persists. In eastern Jiaodong, Muping–Rushan belt produces mainly quartz–sulfide vein-type gold, Upper Jurassic Kunyushan granite Late Lower Cretaceous Sanfoshan wall rock. ...

Journal: Geopersia 2012
Behzad Mehrabi Ebrahim Tale Fazel Maryam Shahabifar

The Muteh gold deposit (NE of Golpaygan) in the central part of intrusive-metamorphic belt of Sanandaj-Sirjan zone comprises NW-SE trending gold-quartz vein occurred in metamorphic complex. Gold mineralization is associated with quartz veins that formed during regional deformation across the mylonitic zones in metamorphic rocks of predominantly meta-volcanic, gneiss and schist. The sulfidation ...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

Journal: :international journal of electrical and electronics engineering 0
zoha asgharian hassan asgharian ahmad akbari bijan raahemi

increasing the popularity of sip based services (voip, iptv, ims infrastructure) lead to concerns about its ‎security. the main signaling protocol of next generation networks and voip systems is session initiation protocol ‎‎(sip). inherent vulnerabilities of sip, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in sip based infra...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

Journal: :J. Inf. Sci. Eng. 2001
Yao-Tsung Lin Shian-Shyong Tseng Shun-Chieh Lin

Due to the rapid growth of networked computer resources and the increasing importance of related applications, intrusions which threaten the infrastructure of these applications have are critical problems. In recent years, several intrusion detection systems designed to identify and detect possible intrusion behaviors. In this work, an intrusion detection model is proposed to for building an in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید