نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2004
Craig Valli

The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...

2012
Garima Shrivastava Anurag Jain

Intrusion Detection System plays a reasonable supplementary role for the firewall in the network security. It can help protect computers from network attacks and improve the security and reliability of the computer. At present intrusion detection system analysis module uses the pattern matching technology. In this article an optimized algorithm was proposed through analyzing the advantages and ...

2013
Mangala Praveena Center S. M. Praveena M. H. Abdullah A. Z. Aris K. Bidin

A numerical model SEAWAT-2000 was developed to investigate the current seawater intrusion status in the low lying area of Manukan Island. SEAWAT-2000 output indicated that there is about 1.4% of freshwater and seawater mixing ratio at sea level in low lying area of Manukan Island illustrates the seawater intrusion problem. Upconing process simulated by SEAWAT-2000 showed the current status of s...

2012
Sharmila Devi Ritu Nagpal

Today we are suffering from many problems because of intruder interference in our communication with other person/organisation. We need a very safe and secure intrusion detection system. So, intrusion detection has become an important area of research The existing systems are not completely flawless and secure. So, there is the need to improve the existing system. In this paper, firstly we are ...

2004
P. Ramasubramanian

This paper describes a framework for a statistical anomaly prediction system using ensemble Quickprop neural network forecasting model, which predicts unauthorized invasions of user based on previous observations and takes further action before intrusion occurs. This paper focuses on detecting significant changes of transaction intensity for intrusion prevention. The experimental study is perfo...

Journal: :Archivos de la Sociedad Espanola de Oftalmologia 2007
G Garay-Aramburu A Larrauri-Arana

CASE REPORT Intrusion is defined as erosion and protrusion of the scleral implant into the vitreous cavity. This condition may occur as a retinal detachment, vitreous hemorrhage, endophthalmitis or be without symptoms. We performed a vitrectomy alone in a patient with relapsing vitreous hemorrhage secondary to the intrusion of a scleral buckle implanted 19 years previously and left intact the i...

2011
Purvag Patel Chet Langin Feng Yu Shahram Rahimi

Our research created a network Intrusion Detection Math (ID Math) consisting of two components: (1) a way of specifying intrusion detection types in a manner which is more suitable for an analytical environment; and (2) a computational model which describes methodology for preparing intrusion detection data stepwise from network packets to data structures in a way which is appropriate for sophi...

Journal: :IJIIT 2015
Anand Kannan Karthik Gururajan Venkatesan Alexandra Stagkopoulou Sheng Li Sathyavakeeswaran Krishnan Arifur Rahman

This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extend...

1999
Jianxiong Luo Susan M. Bridges Julia E. Hodges

This report explores integrating fuzzy logic with two data mining methods (association rules and frequency episodes) for intrusion detection. Data mining methods are capable of extracting patterns automatically from a large amount of data. The integration with fuzzy logic can produce more abstract and flexible patterns for intrusion detection, since many quantitative features are involved in in...

Journal: :American journal of orthodontics and dentofacial orthopedics : official publication of the American Association of Orthodontists, its constituent societies, and the American Board of Orthodontics 1996
G Costopoulos R Nanda

A new radiographic method was developed for measuring changes in root length. With this technique, orthodontic intrusion was investigated as a potential cause of apical root resorption of maxillary incisors. The experimental group consisted of 17 patients with excessive overbite who were treated with a Burstone-type intrusion arch, which delivered a low level of force (about 15 gm per tooth). A...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید