نتایج جستجو برای: intrusion related gold systems
تعداد نتایج: 2333285 فیلتر نتایج به سال:
With the emergence of new generation networks and providing new types of services, as cloud computing networks, the need to provide security that are compatible with the performance of these networks lead us to offer an algorithm for using the context of security available in prior networks. In this algorithm, intrusion detection systems(IDS) are activated depending on the service which selecte...
Up to now, several Artificial Intelligence (AI) techniques and paradigms have been successfully applied to the field of Intrusion Detection in Computer Networks. Most of them were proposed to work in isolation. On the contrary, the new approach of hybrid artificial intelligent systems, which is based on the combination of AI techniques and paradigms, is probing to successfully address complex p...
The Rugged Mountain intrusion is a small (14 km% zoned alkaline pluton located in northwestern British Columbia, 25 kilometres southwest of Telegraph Creek (Brown eta/., lYY2;r. h). The pluton is exposed on the north side of Shakes Creek, a southeasterly flowing tributary of the Stikine River and on the south flank of Rugged Mountain from which it takes its name. The Rugged Mountain pluton was ...
Intrusion is a set of related activities which is performed to provide unauthorized activities such as access to the useful information, file modification etc. It is a set of any actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. Intrusion Detection Systems (IDS) are used to monitor and detect the probable attempts of such types. An IDS co...
Intrusion behavior has the characteristics of fast upgrade, strong concealment In this paper, an integrated network intrusion detection algorithm by combining. judge the safety of a system or network. (6). Intrusion Detection Systems (IDS) are primarily centered on characteristic probable incidents, observation data. ABSTRACT: Intrusion Detection Systems are designed to detect system attacks Re...
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. In this paper we discuss our experience in analyzing potential benefits of distributed multi sensor systems for intrusion detection. Our purpose for this work is ...
-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics i...
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information frommultiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Sy...
The impacts on aquaculture and fisheries sectors from climate change in the southern part of Iraq will likely to be both positive and negative arising from direct and indirect impacts on natural resources. The main elements of climate change that could potentially impact fisheries and aquaculture activities in Iraq are temperature, rain patterns, shortage of freshwater, circulation, upwelling, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید