نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

2015
M. N. S. Lakshmi M. Naga Surya Lakshmi Dorothy Denning

In recent years the security in data mining applications has become crucial in protecting public and private computing systems. Contemporary computing applications are facing numerous complex problems related to various internal or external attacks. This paper mainly focuses on a comprehensive study on Intrusion Detection systems. In modern world of security many researchers have proposed vario...

Journal: :Minerals 2023

Exploring covered terrains is a challenge that requires the integration of multiple sources knowledge, particularly in initial stages mineral exploration. The Apuí region, located Southwestern Amazon Craton, has small and constant gold production, despite deep cover limited geological knowledge. mainly hosted quartz veins breccias cut Paleoproterozoic volcano-sedimentary sequences. occurrences ...

Journal: :ACM SIGCOMM Computer Communication Review 2012

Journal: :Inf. Sec. Techn. Report 2005
Andreas Fuchsberger

2015
Patrik Lif Teodor Sommestad

Intrusion detection systems are common in contemporary enterprises. These systems are sometimes operated by a single individual as a part time activity; they are sometimes operated by cyber security operation centres in which a group of technology experts with the sole task of monitoring, detecting, analysing and responding to threatening events in the computer network. In either case, human fa...

Journal: :CoRR 2010
Mehdi Bahrami Mohammad Bahrami

Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-base...

2001
Houda Labiod Karima Boudaoud

In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...

2007
A. Maciej Rossudowski Hein S. Venter Jan H. P. Eloff

Intrusion Detection Systems play an invaluable role within organisations by detecting attempted attacks on their IT systems. However, Intrusion Detection Systems are complex to set-up and require large quantities of memory and processing power to effectively analyse the large volumes of network traffic involved. Behavioural analysis plays an important role within Intrusion Detection Systems by ...

Journal: :RITA 2016
Felipe Cesar Costa Alves Ed Wilson Tavares Ferreira Valtemir Nascimento Ruy de Oliveira

The growing record of security incidents on computer networks has motivated the development of intrusion detection studies, the main identification techniques of intrusion are based on anomalies and signatures. Currently, the academic community explores preferably research on anomalies based networks, however, there is no common model to develop these proposals so that many authors describe, im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید