نتایج جستجو برای: sargaz granitic intrusion
تعداد نتایج: 19974 فیلتر نتایج به سال:
As the computer environment changes significantly, several mechanisms such as firewall are developed and intrusion detection system (IDS) is the representative among them. However, because many IDSs are modeled and evaluated with known intrusion patterns, they have inertia not to detect the intrusions which are unknown or transformed. In this paper, we propose an IGA-based method to generate th...
Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection is a mechanism of providing security to computer networks. Although there are some existing mechanisms for Intrusion detection, there is need to improve the performance. Data mining techniques are a new approach for Intrusion detection. In this paper we investigate and ev...
In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...
The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...
Post-orogenic extension in back-arc regions is classically associated with metamorphic core complexes (MCCs) cored exhumed rocks and granitic intrusions interacting low-angle detachments. When additional heat provided by the advected asthenosphere below extending region, for instance above slab tears, high-temperature migmatite-cored domes composite are emplaced whose geometry kinematics of emp...
Intrusion detection technology is a research hotspot in the field of information security. This study introduces the types of traditional intrusion detection and data mining technology; Aiming at the defects and limitations of current intrusion detection system, the study has fused the data mining technology into intrusion detection model, and has designed and implemented the intrusion detectio...
The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...
Single zircon dating of the Rampur metabasalts of the Larji–Kullu–Rampur window in the Lesser Himalayas yielded an evaporation age of 1800913 Ma. The zircon age is considerably younger than the previously published whole rock Sm–Nd age of 2510990 Ma, suggesting that the Sm–Nd age may be geologically meaningless and that the Sm–Nd whole rock array may have resulted from mixing. In the NW Himalay...
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
Zircon and monazite from granitic sheets and dikes in the Monashee complex, Canadian Cordillera, were investigated to determine whether igneous crystallization occurred at 1.9 Ga or 50 Ma with 1.9 Ga inherited zircon and monazite. Four of the five samples are weakly deformed to undeformed, despite occurring in a gneiss dome at the structurally deepest exposed level of the orogen that elsewhere ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید