نتایج جستجو برای: intrusion related deposits
تعداد نتایج: 1209151 فیلتر نتایج به سال:
Intrusion detection is a problem of great significance to protecting information systems security. An intruder may move between multiple nodes in the network to conceal the origin of attack. Distributed intrusion detection and prevention plays an increasingly important role in securing computer networks. To overcome the limitations of conventional intrusion detection systems, alerts are made in...
Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements; they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, machine learning-based intrusion detection systems have demonstrated high accuracy, good generalization to novel type...
Network intrusion detection is of great importance in the research field of information security in computer networks. In this paper, we concentrate on how to automatically detect the network intrusion behavior utilizing fuzzy support vector machine. After analyzing the related works of the proposed paper, we introduce the main characterics of fuzzy support vector machine, and demonstrate its f...
Unusually large and locally variable carbon isotope excursions coincident with mass extinctions at the end of the Permian Period (253 Ma) and Guadalupian Epoch (260 Ma) can be attributed to methane outbursts to the atmosphere. Methane has isotopic values (dC) low enough to reduce to feasible amounts the carbon required for isotopic mass balance. The duration of the carbon isotopic excursions an...
by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
Abstract Dongping is the largest Au-Te vein deposit (~120 t Au) in North China craton, but its age, origin, and setting remain unsolved. Here, we integrate paragenesis, geochemistry, situ U-Pb geochronology of garnet to constrain timing possible origin deposit. Gold mineralization at hosted Shuiquangou alkaline complex (ca. 401–390 Ma) dominated by quartz-sulfide veins with minor ores adjacent ...
Dermatitis herpetiformis (DH) is an extraintestinal manifestation of coeliac disease. Untreated coeliac disease patients are known to have transglutaminase 2 (TG2)-targeted IgA deposits in the small bowel mucosa. To evaluate whether similar intestinal IgA deposits are also present in DH and whether the deposits disappear with gluten-free diet, 47 untreated and 27 treated DH patients were studie...
One of the key challenges that researchers should face when proposing a new intrusion detection approach (IDS) is that of demonstrating its general validity. This fact goes necessarily through the disposal of a real set of intrusion (as well as non-intrusion) related events, from which to compare and thus validate the performance of the novel proposed techniques. However, this a priori simple i...
The growing record of security incidents on computer networks has motivated the development of intrusion detection studies, the main identification techniques of intrusion are based on anomalies and signatures. Currently, the academic community explores preferably research on anomalies based networks, however, there is no common model to develop these proposals so that many authors describe, im...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید