نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2014
J. Sravan Kumar Ravi Prakash Reddy Subha Sree

Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine le...

1998
Marcelo Medina

Network based distributed intrusion detection is a common trend in several commercial intrusion detection systems. However, network based intrusion detection requires that a security officer comprehends the dynamic and non-deterministic nature of data traffic across the network. This paper provides security officers with a brief introduction to intrusion detection techniques and classifications...

2009
Kapil Kumar Gupta

INTRUSION Detection systems are now an essential component in the overall network and data security arsenal. With the rapid advancement in the network technologies including higher bandwidths and ease of connectivity of wireless and mobile devices, the focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual informatio...

2015
Mala Bharti

Reddy et al (20) also presented a survey of various data mining techniques for intrusion detection system. Subramanian et al (21) presented the performance. Developing a Hybrid Intrusion Detection System Using Data Mining for A data mining technique called common path mining is used to automatically. The proposed hybrid technique combines data mining approaches like K Novel intrusion detection ...

Journal: :Ground water monitoring & remediation 2009
Ozgur Bozkurt Kelly G Pennell Eric M Suuberg

This paper presents model simulation results of vapor intrusion into structures built atop sites contaminated with volatile or semi-volatile chemicals of concern. A three-dimensional finite element model was used to investigate the importance of factors that could influence vapor intrusion when the site is characterized by non-homogeneous soils. Model simulations were performed to examine how s...

2017
Varsha Sainani Terri A. Scandura Mei-Ling Shyu

Journal: :PROCEEDINGS OF THE JAPANESE CONFERENCE ON HYDRAULICS 1989

2016
Mario Golling Robert Koch Gabi Dreo Rodosek

Network Intrusion Detection Systems are nowadays an integral part of network security. NIDS provide a layer of defense by monitoring and analyzing the traffic for signs of suspicious activities and alerting system administrators when potential violations are detected. In the context of large, high-speed networks, such as backbone networks, we make two observations: Firstly, devices capable of d...

2014
Tejaswini Badgujar

Intrusion detection system has become a core component in computer network era. It is expanding day by day. That is why, there is a need for security from attackers, spammers and criminal enterprises as they are growing up with the expansion of Internet. An Intrusion Detection System is integrated with neural network using layered framework to build an effective computer network. This existing ...

2004
Craig E. Manning

Magmatic augites reacted with high temperature aqueous solutions to form secondary calcic pyroxenes during the subsolidus cooling of the Skaergaard intrusion. Secondary, hydrothermal clinopyroxenes replace wall rock igneous augites at the margins of veins filled with calcic amphibole. These veins are up to several millimeters wide and tens of meters in length. Hydrothermal clinopyroxenes are a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید