نتایج جستجو برای: sargaz granitic intrusion

تعداد نتایج: 19974  

2015
J. K. Kalita

Consequently, Intrusion Detection Systems (IDS) are quickly becoming a Intrusion Detection System Using Ontology and Clustering Techniques, Book Title. NIDS solutions offer sophisticated, real-time intrusion detection capabilities often Though this method takes time to set up, as baselining requires the NIDS. State-of-the-art intrusion detection, prevention and reaction simulation systems analy...

Journal: :Journal of Computer Security 2005
Meng Yu Peng Liu Wanyu Zang

It is important for critical applications to provide critical services without any integrity or availability degradation in the presence of intrusions. This requirement can be satisfied by intrusion masking techniques under some situations. Compared with intrusion tolerance techniques, where some integrity or availability degradations are usually caused, intrusion masking techniques use substan...

2009
Ruth Rendell

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

2015
M. Caselli E. Zambon J. Petit

In the real time Intrusion Detection system, the main confront is to detect the Anomaly Intrusion Detection system Model with ADWIN change Detector. intrusion detection system, that utilizes machine learning techniques such as single classifier and hybrid build the model was decreased and the detection. Intrusion Detection System (IDS) to detect and prevent cybercrimes to protect these The prop...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

Ahmadi Khalaji, Ahmad, Kamran, saeed, Rezaei-Kahkhaei , mahdi, Tahmasbi, Zahra,

The Nokeh intrusion exposed in the northern Semnan area. The intrusion is composed of monzonite-quartz monzonite and granite-granodiorite and was intruded in the Eocene carbonaceous tuffs, where the country rocks converted to magnetite-skarn. Plagioclase, orthoclase, quartz, biotite, amphibole and clinopyroxene are the constituent minerals of Nokeh intrusion. The study rocks represent granular,...

Journal: :Geološki anali Balkanskoga poluostrva 2023

U-Pb geochronology of zircon grains retrieved from magmatic rocks intruding the Jadar block terrane in central Balkans is used here to add new constraints on accretion processes and provenance crustal sources this potentially exotic block. Using an unorthodox approach, we analyzed zircons extracted products Cenozoic (Cer Boranja granitoid massifs) Triassic magmatism (Bobija andesitic tuff - Pie...

Journal: :Geothermal Energy 2021

Abstract One of the most important processes heat generation from Earth's interior is radioactive decay isotopes. The main hosts major radiogenic elements U, Th and K in crust are granitoids. Sierras de Córdoba formed dissimilar granitic intrusions emplaced by a series magmatic events that occurred during Paleozoic. different granitoids classified as A-type, I-type, S-type, there also expressio...

Journal: :Acta Geologica Polonica 2023

Many granitic intrusions display evidence of magma mixing processes. The interaction melts contrasting composition may play a significant role during their generation and evolution. Strzegom-Sobotka massif (SSM), located in the Sudetes (SW Poland) north-eastern part Bohemian Massif Central European Variscides, exhibits mingling on macro- micro-scales. The massif is composite intrusion, with fou...

1998
Marcelo Medina

Network based distributed intrusion detection is a common trend in several commercial intrusion detection systems. However, network based intrusion detection requires that a security officer comprehends the dynamic and non-deterministic nature of data traffic across the network. This paper provides security officers with a brief introduction to intrusion detection techniques and classifications...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید