نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2016
Isah Olawale Mustapha Rasheed Gbenga Jimoh

Increase demand by all and sundry for internet and share network, has enhanced the development of various network technology that has linked together different people of different motives, consequently it has paved way for malicious and unauthorized user to intrude into information resources of organization. As a result of the advantage embedded in the layered framework and those of signature b...

Journal: :IEEE Trans. Evolutionary Computation 2002
Paul K. Harmer Paul D. Williams Gregg H. Gunsch Gary B. Lamont

With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Cur...

Journal: :Int. Arab J. Inf. Technol. 2016
Sannasi Ganapathy Pandi Vijayakumar Yogesh Palanichamy Arputharaj Kannan

As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the networks by means of effective intrusion detection and prevention methods. This can be achieved mainly by developing efficient intrusion detecting systems that use efficient algorithms which can identify the abnormal act...

Journal: :International Journal of Computer Applications 2014

Journal: :International Journal of Computer Applications Technology and Research 2014

2013
Mohammad Rafiee Majid Mohammadi

With the emergence of new generation networks and providing new types of services, as cloud computing networks, the need to provide security that are compatible with the performance of these networks lead us to offer an algorithm for using the context of security available in prior networks. In this algorithm, intrusion detection systems(IDS) are activated depending on the service which selecte...

-

Qara Aqaj titanium potential is one of the two major known titanium resources in Iran. The main host rocks of the ore body are ultramafics including wehrlite and lherzolite with minor clinopyroxenite. Qara Aqaj intrusion is composed mainly of ultramafic-mafic rocks, layered gabbro, diorite, microdiorite and some monzonite and alkali syenite. This intrusion has intruded the basement complex (amp...

Journal: :Minerals 2021

In 1990, the Sopcheozero Cr deposit was discovered in Monchegorsk Paleoproterozoic layered mafic-ultramafic intrusion (Monchepluton). This stratiform early-magmatic occurs middle part of Dunite Block, which is a member Monchepluton series. The Cr2O3 average-weighted content ordinary and rich ores 16.65 38.76 wt.%, respectively, at gradually changing concentrations within rich, poor ore types bo...

2000
PETER C. CHU RONGFENG LI

This paper investigates the seasonal variabilities of the South China Sea isopycnal-surface circulations and of the Kuroshio intrusion through the Luzon Strait using the U.S. Navy’s climatological temperature and salinity dataset (public domain) with 1⁄28 3 1⁄28 resolution by the P-vector method. The representative pattern is a persistent basin-scale cyclonic circulation away from the surface, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید