نتایج جستجو برای: outflow intrusions
تعداد نتایج: 23227 فیلتر نتایج به سال:
During recent years, worldwide concern has been focused on the potential for contamination of surface waters and ground waters by agrochemicals in runoff and soil water from irrigated fields. Given this perspective, it is very important to correctly evaluate the levels of different agrochemicals in water, both from human toxicological and environmental viewpoints and to develop management strat...
-
The current study extends previous investigation of schizotypy as a vulnerability factor for trauma-related intrusions through the use of a clinical sample. Fifty people seeking psychological interventions after experiencing a distressing or traumatic event completed measures of positive schizotypy, posttraumatic stress disorder symptomatology, peritraumatic dissociation, and mood. Individuals ...
Intrusive mental experiences occur within posttraumatic stress disorder (PTSD) and some psychotic disorders. Similarities in the phenomenology and content in the intrusions of both disorders have been noted. Currently there is little understanding of any common etiology in terms of information-processing styles. This study investigated predictors of analogue posttraumatic intrusive cognitions w...
Employers and employees are both highly vulnerable to negative consequences which may result from e-mail privacy intrusions. These intrusions may arise internally from co-workers or the employer, or externally from entities associated with the U.S. legal system, such as law enforcement agencies or attorneys, or from hackers. Given potentially differing perceptions regarding e-mail privacy and t...
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect intrusions and to describe the known intrusions. These systems have some disadvantages which we solve with a new approach called ANIMA. ANIMA stores ...
In the companion abstract in this proceedings (Parsons and Yoneyama 1998), we discussed dry intrusions and their origins. It was found that these dry intrusions over the equatorial waters actually originated in the middle latitude westerly winds. The reader is referred to that paper for discussion of the origins and for further background information on these dry intrusion events. In this paper...
In this paper an approach to detection, assessment and prevention of further intrusions of distributed intrusions in a computer network is presented. Our approach uses audit data from multiple network nodes and services. To achieve accurate result, inherent security relations among different network nodes should be considered. In our approach, security dependency relation (SDR) is defined to de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید