نتایج جستجو برای: Intrusion

تعداد نتایج: 18427  

Mehdi Abadi Sa'eed Jalili

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Journal: :نشریه دانشکده فنی 0
مهدی آبادی سعید جلیلی

in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Existence of outflow intrusion introduces small-scale turbulence that perturbs the vertically stratified character of the sound velocity and causes spatial and temporal fluctuations of the sound propagation. In this experimental study, we have investigated acoustic wave propagation with frequency of 50 kHz in a pre-stratified environment with intrusion of a turbulent plume while the si...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

The Miocene Qohrud granitoid intrusion consists of granite, granodiorite and tonalite and is located in the Urmia-Dokhtar magmatic belt. Intrusion of magmatic rocks into the various sedimentary rocks including shale, sandstone, limestone and marl, with Jurassic to Eocene age, has caused contact metamorphism of the surrounded rocks. Varity of hornfelses and skarns are formed in this regards. Hyd...

Journal: :International Journal of Information Security 2001

Journal: Desert 2018
H. Ghasemieh, I.D. Clark M. Mirzavand R. Bagheri S.J. Sadatinejad

Owing to population growth and water demand, coastal aquifers all over the world are over–pumped, resulting in serious problems such as saltwater intrusion. So, in these conditions, assessing the groundwater system’s vulnerability and finding areas with saltwater intrusion potential are vital for the better management of aquifers. In this study, AHP-GALDIT was applied to saltwater intrusion vul...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشکده علوم زمین سازمان زمین شناسی و اکتشافات مع 1390

the neogene intrusion masses in the noudeh-enghelab area located to the north of sabzevar ophiolite have cut the late cretaceous ophiolitic rocks, sedimentary- volcanic and eocene volcanic rocks and have been covered by pliocene and quaternary deposits. the margin is of lava with basalt, phyric andesite-basalt and andesite and the central parts (dome shaped) composed of phyric andesite-trachyan...

Journal: :journal of advances in computer engineering and technology 0
nafiseh daneshgar islamic azad university qazvin branch qazvin, iran m. habibi najafi islamic azad university qazvin branch qazvin, iran mohsen jahanshahi dept. of computer engineering central tehran branch, islamic azad university, tehran, iran ehsan ahvar institut mines-telecom telecom sudparis, evry, france

energy consumption is considered as a critical issue in wireless sensor networks (wsns). batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. an efcient solution to improve energy consumption and even trafc in wsns is data aggregation (da) that can reduce the number of transmissions. two main challenges for da are: (i)...

2013
Montaceur Zaghdoud Mohammed Saeed Al-Kahtani

An intrusion response system is charged with minimizing any losses caused by intrusion. It remains ineffective if the response to the intrusion does not bring the timely and adequate corrections required by the victim system. This paper proposes a new intrusion response system based on contextual fuzzy cognitive map. In this intrusion response system framework, a new ontology is defined based u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید