Efficient Techniques for Unauthorized Attacks with Time-Stamp
نویسندگان
چکیده
منابع مشابه
Efficient FSM Techniques for IDS to Reduce the System Attacks
The main purpose of this research is to introduce the new techniques of Finite State Machine (FSM), mainly DFA and PDA to filter the error attacks of an Intrusion Detection System. The main purpose of implementing the PDA model in attacks is to minimize the space required which is important issue in network when attacks are push and slow down the network traffic. The data transfer from Intrusio...
متن کاملStructural Time Series Modelling with Stamp 6.02
The structural time series approach involves decomposing a series into components which have a direct interpretation. Usually, three components are considered: a trend, a seasonal component and an irregular component. However, other dynamic processes can also be included in this decomposition. The estimation of the components of this additive decomposition is called signal extraction. A structu...
متن کاملTime Stamp Protocol for Smart Environment Services
By development of wireless mobile communication, many users increased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is no...
متن کاملTime-stamp generation for optimistic parallel computing
Optimistic execution techniques are widely used in the field of parallel discrete event simulation. In this paper we show that optimistic execution can also be used to parallelize program control structures. We discuss the requirements for handling unbounded constructs and demonstrate the need for a flexible time– stamp allocation scheme. We present a scheme using variable–length time–stamps wh...
متن کاملEfficient Query Processing Techniques for Spatial Time
A spatial time series dataset is a collection of time series, each referencing a location in a common spatial framework. Correlation analysis is often used to identify pairs of potentially interacting elements from the cross product of two spatial time series datasets (the two datasets may be the same). However, the computational cost of correlation analysis is very high when the dimension of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2014
ISSN: 2278-0661,2278-8727
DOI: 10.9790/0661-16651415