نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

2008
Liberios VOKOROKOS Anton BALÁŽ Norbert ÁDÁM

The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...

2015
A. Umamaheswari B. Kalaavathi

Intrusions are the activities that violate the security policy of system. Shared broadcast radio channel, insecure operational environment, lack of central authority, lack of association, limited resource availability and physical vulnerability are the important issues in MANET. Intrusion Detection is the process used to identify intrusions. Intrusion detection system provides three important s...

Journal: :Psychonomic bulletin & review 2015
Talya Sadeh Rani Moran Yonatan Goshen-Gottstein

It is well established that performance in free-recall is mediated by an individual's ability to reinstate the study-context during retrieval. This notion is supported by an abundance of evidence and is reflected in prominent models of memory. Introspectively, however, we often feel that a memory just 'pops into mind' and its recall is not accompanied by contextual detail. Here we ask whether t...

2017
B. Ainsworth H. Bolderston M. Garner

BACKGROUND Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. METHOD 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise...

Journal: :Behaviour research and therapy 2001
E Rassin

Both thought-action fusion (TAF: i.e., a cognitive bias implying an inflated sense of responsibility for one's own thoughts) and thought suppression have been claimed to contribute to the development of obsession-like intrusions. Therefore, it seems plausible that conjunction of these phenomena results in highly intense intrusions. However, possible interactions between TAF and thought suppress...

1999
Warwick M Kissling

Modeling carried out using a super-critical version of TOUGH2 has been used to investigate different source models for the geothermal fields in the Taupo Volcanic Zone (TVZ), New Zealand. The models describe the cooling, by groundwater circulation, of magmatic intrusions into the upper 8 km of the crust. By comparing the calculated surface heat flux from these intrusions with actual thermal out...

2003
Michael J. L. Sullivan David Rouse Scott Bishop Sheila Johnston

This study examined the effects of thought suppression, prior to an experimental pain procedure, on subsequent pain experience. The study also examined the role of thought intrusions in mediating the relation between (1) thought suppression and pain, and (2) catastrophizing and pain. Catastrophizers (n = 34) and noncatastrophizers (n = 36) made pain ratings while one arm was immersed in ice wat...

2018
Alex Lau-Zhu Emily A. Holmes Kate Porcheret

Purpose of the Review Intrusive memories are those that spring to mind unbidden, e.g. sensory recollections of stressful/traumatic events. We review recent methods to monitor intrusions of a stressor (a trauma film) within the laboratory. Recent Findings Recent studies suggest three main methodologies after viewing a trauma film by which to monitor intrusions in the laboratory: during post-fi...

2015
I. Ohaeri O. Ekabua

The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generation wireless networks that can optimize the use of spectrum due to its unique and dynamic properties, but the high rate of intrusions has frus...

2003
Yves Deswarte David Horne

This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید