نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

Journal: :dental research journal 0
mostafa abtahi neda eslami reza zare mahmoud abadi saber pooria rezaei

background: there is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. the aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults. materials and methods: patients referred to the department of orthodontics of mashhad university of medical sciences participated in this study. ...

2002
R. Guha

In this paper we propose a distributed agent framework for an intrusion detection system aimed at ad hoc wireless networks. Wireless networks are particularly vulnerable to intrusion, as they operate in an open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple security agents, we analyze the entire ad hoc wireless network for intr...

2013
David C. Wyld

Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and probe/scan system attacks .To handle these intrusions, Cyber Security uses three audit and monitoring systems namely Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS). Intrusion Detection System (IDS) monitors ...

2003
Mikhail Gordeev

Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...

2005
Giovanni Di Crescenzo Abhrajit Ghosh Rajesh Talpade

We embark into theoretical approaches for the investigation of intrusion detection schemes. Our main motivation is to provide rigorous security requirements for intrusion detection systems that can be used by designers of such systems. Our model captures and generalizes well-known methodologies in the intrusion detection area, such as anomaly-based and signature-based intrusion detection, and f...

Journal: :IJDSN 2013
Nabil Ali Alrajeh Shafiullah Khan Bilal Shams

The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments. As many innovative and efficient models have emerged in the last decade in this area, we mainly focus our work on Intrusion ...

2007
Lei WEI

This paper proposes a group of criteria for evaluating Intrusion Detection Systems (IDS for short). In this article, an existing evaluation strategy of intrusion detection system is going to be briefly introduced as a case to be assessed against our proposed criteria. Intrusion Detection Systems are critical components to the primary defence of computer system and network security. An evaluatio...

2001
Xinyuan Wang Douglas S. Reeves S. Felix Wu

Network-based intrusion has become a serious threat to today’s highly networked information systems, existing intrusion defense approaches such as intrusion prevention, detection, tolerance and response are “passive” in response to network-based intrusions in that their countermeasures are limited to being local to the intrusion target and there is no automated, network-wide counteraction again...

2001
Christopher Krügel Thomas Toth

The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید