منابع مشابه
UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection
Activity logs can be used for intrusion detection; however, most previous work on intrusion detection examines only activity logs from a single component. Doing so fails to take advantage of the naturally existing correlations among activities in different types of logs, such as network logs and system call logs. This paper explores correlation for intrusion detection. Specifically, we propose ...
متن کاملestimation of production and logging costs in shafaroud logging company
sustainable forest management in caspian forests of iran requires cost-benefit analysis in order to maintain the quality of timber stands during logging operations. this study was done with the aim of cost and gross revenue computations from current logging (net present value) in three adjacent compartments in district 2 of shafroud watershed. motion and time studies were carried out during fel...
متن کاملLogging and Recovery
DEFINITION Logging and recovery ensure that failures are masked to the users of transaction-based data management systems by providing automatic treatment for different kinds of failures, such as transaction failures, system failures (crashes), media failures and disasters. The main goal is to guarantee the atomicity (A) and durability (D) properties of ACID transactions by providing undo recov...
متن کاملLogging off
The World Bank estimates the value of the global illegal timber trade at more than $10 billion per year. Tracking the timber supply chain is poor and allows widespread illegal logging, log smuggling and log laundering, it believes. Timber taken from remote forests in Asia, Russia, South America and Africa is often shipped long distances and its only certification is a paper trail that is highly...
متن کاملinvestigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances
در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Scientific Research and Management
سال: 2020
ISSN: 2455-6378
DOI: 10.36282/ijasrm/5.2.2020.1695