Conflagration and logging detection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection

Activity logs can be used for intrusion detection; however, most previous work on intrusion detection examines only activity logs from a single component. Doing so fails to take advantage of the naturally existing correlations among activities in different types of logs, such as network logs and system call logs. This paper explores correlation for intrusion detection. Specifically, we propose ...

متن کامل

estimation of production and logging costs in shafaroud logging company

sustainable forest management in caspian forests of iran requires cost-benefit analysis in order to maintain the quality of timber stands during logging operations. this study was done with the aim of cost and gross revenue computations from current logging (net present value) in three adjacent compartments in district 2 of shafroud watershed. motion and time studies were carried out during fel...

متن کامل

Logging and Recovery

DEFINITION Logging and recovery ensure that failures are masked to the users of transaction-based data management systems by providing automatic treatment for different kinds of failures, such as transaction failures, system failures (crashes), media failures and disasters. The main goal is to guarantee the atomicity (A) and durability (D) properties of ACID transactions by providing undo recov...

متن کامل

Logging off

The World Bank estimates the value of the global illegal timber trade at more than $10 billion per year. Tracking the timber supply chain is poor and allows widespread illegal logging, log smuggling and log laundering, it believes. Timber taken from remote forests in Asia, Russia, South America and Africa is often shipped long distances and its only certification is a paper trail that is highly...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Scientific Research and Management

سال: 2020

ISSN: 2455-6378

DOI: 10.36282/ijasrm/5.2.2020.1695