نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2014
Manoj Sharma Keshav Jindal

The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...

Journal: :CoRR 2011
Hichem Sedjelmaci Mohammed Feham

Network security is one of the major concerns of studies have been conducted on the intrusion detection system. Cluster-based Wireless A novel hybrid intrusion detection method method for wireless sensor networks. Accepted papers & International Conference on Advanced Wireless, Paper title:A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. Paper title: A Novel Cluster He...

2012
Kalpana Kumari Anurag Jain Swati Dongre

Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune s...

Journal: :CoRR 2010
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir

In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion pre...

2012

Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the States Government assumes no liability for its contents or use thereof. If trade or manufacturers' names or products are mentioned, it is because they are considered essential to the object of the ...

 Background and purpose: Skeletal anchorage is a new aid for the correction of moderate anterior open bite. This study aimed at treating moderate anterior open bite using posterior intrusion via mini implants. In addition, a review of studies carried out on open bite correction using absolute anchorage was performed. Materials and methods: The following keywords were used: open bite, camouflag...

2000
Andrew Watkins

This paper presents an examination of intrusion detection schemes. It discusses traditional views of intrusion detection, and examines the more novel, but perhaps more effective, approach to intrusion detection as modeled on the human immune system. The discussion looks at some of the implications raised by intrusion detection research for information security in general.

2002
Kofi Nyarko Tanya Capers Craig Scott Kemi Ladeji-Osias

The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. In this paper, we explore several netw...

2014
Hussain Ahmad Madni Uppal Memoona Javed M. J. Arshad

The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which is basically an attack to these resources. Then it alerts and informs a...

2006
Yannis Viniotis

ALDWAIRI, MONTHER MUSTAFA. Hardware Efficient Pattern Matching Algorithms and Architectures for Fast Intrusion Detection. (Under the direction of Dr. Paul Franzon). Intrusion detection processors are becoming a predominant feature in the field of network hardware. As demand on more network speed increases and new network protocols emerge, network intrusion detection systems are increasing in im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید