نتایج جستجو برای: layered intrusion
تعداد نتایج: 51992 فیلتر نتایج به سال:
Two occurrences of platinum-group elements (PGEs) along the northern margin of the Skaergaard intrusion include a sulfide-bearing gabbro with slightly less than 1 ppm PGE + Au and a clinopyroxene-actinolite-plagioclase-biotiteilmenite schist with 16 vol% sulfide and 1.8 ppm PGE + Au. Both have assemblages of pyrrhotite, pentlandite, and chalcopyrite typical for orthomagmatic sulfides. Matching ...
A network system could be better protected by physically dividing it into administrative management groups according to different access rights. However, to effectively manage a network system, security information sharing is necessary. Since a system could suffer from the same security threats as another system, how to share the security information to prevent a system from the same security f...
We present results of seismic tomography for a broad region of southern Africa using data from the seismic component of the Kaapvaal Project, a multinational, multidisciplinary experiment conducted in the late 1990s. Seismic images provide clear evidence of mantle structures that mimic the surface geology across the region and provide important constraints on subcrustal structure associated wit...
Today's anomaly-based network intrusion detection systems (IDSs) are plagued with detecting new and unknown attacks. The review of the literature builds ideas for researching the problem of detecting these attacks using multi-layered feed forward neural network (MLFFNN) IDSs. The scope of the paper focused on a review of the literature from primarily 2008 to the present found in peer-review and...
Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect...
In the present work, we propose a new technique to enhance the learning capabilities and reduce the computation intensity of a competitive learning multi-layered neural network using the K-means clustering algorithm. The proposed model use multi-layered network architecture with a back propagation learning mechanism. The K-means algorithm is first applied to the training dataset to reduce the a...
IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable intellectual assets. In this paper, the layered model for IDS and alert aggregation technique is used. In this layered IDS architecture, each layer assesses, filters, and/or agg...
In this, we are using two techniques together as signature based and anomaly based called as Hybrid technique. Anomaly detection, where the strategy is to suspect of what is considered an unusual activity for the subject (users, processes, etc.) and carry on further investigation. This approach is particularly effective against novel (i.e. previously unknown) attacks. Signature based detection ...
With the advent and explosive growth of the global Internet adaptive/automatic network intrusion and anomaly detection in wide area data networks is fast gaining critical research and practical importance. In order to detect intrusions in a network, need efficient IDS. Deep packet inspection (DPI) has the ability to inspect both packet headers and payloads to identify the attack signatures in o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید