نتایج جستجو برای: intrusion related gold systems
تعداد نتایج: 2333285 فیلتر نتایج به سال:
The problem of intrusion has been a long standing computer security challenge. With governments and institutes relying more on computer networks it is becoming essential to arm networks with defenses against intrusion and misuse. Such intrusions include installing harmful viruses, spreading worms, initiating distributed attacks, and misuse by authorized users. To defend against these attacks, s...
• Gold mineralization occurred in the subduction stage of Early Paleozoic Proto-Tethys ocean, and its age is limited between 454 Ma 439 Ma. H-O-S-Pb-Hf isotopes indicate a magmatic-hydrothermal source, closely related to monzogranites. The Heihaibei gold deposit may instead be classified as granitic intrusion-related deposit. newly discovered southern part Eastern Kunlun Orogenic Belt. Its most...
This paper describes a testing environment for commercial intrusiondetection systems,shows results of an actual test run and presents a number of conclusions drawn from the tests. Our test environment currently focuses on IP denial-of-service attacks, Trojan horse traffic and HTTP traffic. The paper focuses on the point of view of an analyst receiving alerts sent by intrusion-detection systems....
–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...
Intrusion Detection System (IDS) which is increasing the key element of system security is used to identify the malicious activities in a computer system there are different approaches being employed in intrusion detection systems. The prediction process may produce false alarms in many anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate in establish...
This paper surveys and provides experimental results related to network design techniques focused on enhancing the security of industrial control systems. It analyzes defensein-depth strategies, network segmentation, network firewall configurations and the role of intrusion prevention systems, intrusion detection systems and anomaly detection systems. The paper also studies the applicability of...
With the ever increased use of computers for critical systems, computer security— the protection of data and computer systems from intentional, malicious intervention—is attracting increasing attention. Many methods of defence already exist, of which one is the strong perimeter defence. This thesis is concerned with one such method of defence, the automated computer security intrusion detection...
The energetic performances of seven SOD or RHO-topology ZIFs, with zinc or cobalt metal cation (ZIF-8, ZIF-90, Zn(dcim)2-SALE, ZIF-67, ZIF-7, ZIF-71, ZIF-11) were evaluated using water intrusion-extrusion under high pressure. The relationship between the structural parameters (in particular the pore system SOD or RHO, the type of linker, the metal cation nature) and the intrusion pressure was s...
Machine learning and data mining algorithms are increasingly being used in the intrusion detection systems (IDS), but their performances are laggard to some extent especially applied in network based intrusion detection: the larger load of network traffic monitoring requires more efficient algorithm in practice. In this paper, we propose and design an anomaly intrusion detection (AID) system ba...
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. The detection of attacks against computer networks is becoming a harder problem to solve in the field of Network security. Intrusion Detection is an essential mechanism to protect computer systems from many attacks. As the transmission of data over the internet increas...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید