نتایج جستجو برای: sargaz granitic intrusion
تعداد نتایج: 19974 فیلتر نتایج به سال:
Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intr...
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. However, the performance of misuse intrusion detection system (MIDS) or anomaly intrusion detection system (AIDS) is not satisfying. In this paper, we study the issue of building a compound intrusion detection model, w...
LCT-granitic pegmatites as defined by (Cerny, 1991) are anomalously enriched in Li, Rb, Cs, Be, Sn, Ga, Ta>Nb, (B,P,F) and are host to many of the worlds most precious gemstones including emerald, chrysoberyl and topaz (Minas Gerais, Brazil), sapphire and ruby (Afghanistan and Pakistan), and gem tourmaline (Pala District, California). Twelve Minfile (MF) occurrences of LCT-pegmatites are record...
Four new species of terrestrial isopods from Sardinia are described: Alpioniscus thanit sp. nov. (Trichoniscidae), Halophiloscia cristagalli sp. nov. (Halophilosciidae), Alloschizidium maymon sp. nov. and Alloschizidium magrinii sp. nov. (Armadillidiidae). Alpioniscus thanit and Alloschizidium magrinii were collected in endogean environments, Halophiloscia cristagalli on granitic beaches of sma...
The Wadi Dib magmatic complex is the oldest known alkaline ring complex in the Egyptian part of the Pan-African orogenic belt. Rb-Sr isotope data for seven samples suggest a Vendian age of 578=k16 Ma, and a 87Sr/S6Sr initial ratio of 0.7048±0.0010. The igneous complex has a diameter of 2 km and was emplaced within granodioritic Pan-African host rocks at the intersection of two faults. It shows ...
This paper analyzes the current situation of the intrusion detection system, which is the basis to put forward that data mining technology is to be applied to the intrusion detection system in terms of the problems of the traditional intrusion detection system. Meanwhile, the paper designs the intrusion detection model of data mining. With the study on intrusion detection and data mining, the a...
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
Security is becoming a critical part of organizational information systems and security of a computer system or network is compromised when an intrusion takes place. In the field of computer networks security, the detection of threats or attacks is nowadays a critical problem to solve. Intrusion Detection Systems (IDS) have become a standard component in network security infrastructures and is ...
A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detecti...
Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید