نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2017
Jens C. Ø. Andersen Gavyn K. Rollinson Iain McDonald Christian Tegner Charles E. Lesher

Two occurrences of platinum-group elements (PGEs) along the northern margin of the Skaergaard intrusion include a sulfide-bearing gabbro with slightly less than 1 ppm PGE + Au and a clinopyroxene-actinolite-plagioclase-biotiteilmenite schist with 16 vol% sulfide and 1.8 ppm PGE + Au. Both have assemblages of pyrrhotite, pentlandite, and chalcopyrite typical for orthomagmatic sulfides. Matching ...

2005
Shang-Juh Kao Lai-Ming Shiue

A network system could be better protected by physically dividing it into administrative management groups according to different access rights. However, to effectively manage a network system, security information sharing is necessary. Since a system could suffer from the same security threats as another system, how to share the security information to prevent a system from the same security f...

2004
MATTHEW J. FOUCH DAVID E. JAMES JOHN C. VANDECAR SUZAN VAN DER LEE Matthew J. Fouch John C. VanDecar Suzan van der Lee

We present results of seismic tomography for a broad region of southern Africa using data from the seismic component of the Kaapvaal Project, a multinational, multidisciplinary experiment conducted in the late 1990s. Seismic images provide clear evidence of mantle structures that mimic the surface geology across the region and provide important constraints on subcrustal structure associated wit...

Journal: :IJSITA 2014
Loye Lynn Ray Henry Felch

Today's anomaly-based network intrusion detection systems (IDSs) are plagued with detecting new and unknown attacks. The review of the literature builds ideas for researching the problem of detecting these attacks using multi-layered feed forward neural network (MLFFNN) IDSs. The scope of the paper focused on a review of the literature from primarily 2008 to the present found in peer-review and...

2004
Kevin P. Anchor Paul D. Williams Gregg H. Gunsch Gary B. Lamont

Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect...

2003
K. M. Faraoun A. Boukelif

In the present work, we propose a new technique to enhance the learning capabilities and reduce the computation intensity of a competitive learning multi-layered neural network using the K-means clustering algorithm. The proposed model use multi-layered network architecture with a back propagation learning mechanism. The K-means algorithm is first applied to the training dataset to reduce the a...

2012
Ravindra Bhat

IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable intellectual assets. In this paper, the layered model for IDS and alert aggregation technique is used. In this layered IDS architecture, each layer assesses, filters, and/or agg...

2013
Archana patil A. T. Bhole

In this, we are using two techniques together as signature based and anomaly based called as Hybrid technique. Anomaly detection, where the strategy is to suspect of what is considered an unusual activity for the subject (users, processes, etc.) and carry on further investigation. This approach is particularly effective against novel (i.e. previously unknown) attacks. Signature based detection ...

2014
P Prudhvi H Venkateswara reddy

With the advent and explosive growth of the global Internet adaptive/automatic network intrusion and anomaly detection in wide area data networks is fast gaining critical research and practical importance. In order to detect intrusions in a network, need efficient IDS. Deep packet inspection (DPI) has the ability to inspect both packet headers and payloads to identify the attack signatures in o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید