نتایج جستجو برای: layered intrusion
تعداد نتایج: 51992 فیلتر نتایج به سال:
Layered network architectures (OSI, TCP/IP) separate functionality in layers, allowing them to be designed and implemented independently. However, from the security point of view, once a lower layer is compromised, the reliability of the higher layers can be impaired. This paper is about the security of the Data Link Layer, which can affect the reliability of higher layers, like TCP, HTTP and o...
In this paper, we present a layered cyber-attack detection system with semantics and context capabilities. The described approach has been implemented in a prototype system which uses semantic information about related attacks to infer all possible suspicious network activities from connections between hosts. The relevant attacks generated by semantic techniques are forwarded to context filters...
1. INTRODUCTION The Bushveld Complex in South Africa is a layered igneous intrusion that contains the world's largest known deposit of platinum group metals, as well as significant deposits of vanadium and chrome [1]. It spans about 350 km from east to west and is mined from surface down to about 2300 m. The platinum group metals are concentrated in two planar orebodies, the Merensky and the UG...
Today’s network intrusion detection system is plagued with working in a dynamic environment. These systems must be able to cope with detecting new and unknown attacks. Current research has shown that the use of anomaly-based multi layered feed forward neural networks can provide help. However, these systems have issues that need to be resolved. These issues involve the architecture and preparat...
Mercury has been determined by radiochemical neutron-activation analysis in nineteen representative rocks from the Skaergaard intrusion and in the separated cumulus minerals of five. The chilled marginal gabbro contains o'23 ppm Hg, values in the Layered Series rocks ranging from o'o7 to o'34 ppm, in one exceptional case reaching I "23 ppm Hg. There is a tendency for mercury to be more abundant...
Access control has long been the linchpin of intrusion prevention. Modern networked systems that are intended to be secure have a global policy, usually implicit, that specifies the overall system-level objectives with respect to access to various resources. The policy indicates both what is inadmissible, so that the intrusion attempts from within and without the network may be prevented, and w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید