نتایج جستجو برای: layered intrusion
تعداد نتایج: 51992 فیلتر نتایج به سال:
The practise of recognising unauthorised abnormal actions on computer systems is referred to as intrusion detection. primary goal an Intrusion Detection System (IDS) identify user behaviours normal or based the data they communicate. Firewalls, encryption, and authentication techniques were all employed in traditional security systems. Current scenarios, other hand, are very complex capable rea...
In this work is presented a general architecture for a multi physical agent network system based on the coordination and the behaviour management. The system is organised in a hierarchical structure where are distinguished the individual agent actions and the collective ones linked to the whole agent network. Individual actions are also organised in a hybrid layered system that take advantages ...
Indoor physical security, as a perpetual and multi-layered phenomenon, is a timeintensive and labor-consuming task. Various technologies have been leveraged to develop automatic access control, intrusion detection, or video monitoring systems. Video surveillance has been significantly enhanced by the advent of Pan-Tilt-Zoom (PTZ) cameras and advanced video processing, which together enable effe...
The Sonju Lake intrusion (SLI) is a 1200-m thick, sheet-like, tholeiitic layered intrusion located within the 1096 Ma Beaver Bay Complex of NE Minnesota. Its cumulus stratigraphy of Ol Pl+Ol Pl+Cpx+Ol Pl+Cpx+Ox±Ol Pl+Cpx+Ox+Ol+Ap indicates formation by closed-system fractional crystallization of a tholeiitic magma. In 1999, outcrop sampling revealed a stratiform PGE-enriched interval within oxi...
چکیده ندارد.
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید