نتایج جستجو برای: anomaly detection

تعداد نتایج: 591345  

2006
Daniel Z. Freedman Boris Körs

We review the subject of Kähler anomalies in gauged supergravity, emphasizing that field equations are inconsistent when the Kähler potential is non-invariant under gauge transformations or when there are elementary Fayet-Iliopoulos couplings. Flux vacua solutions of string theory with gauged U(1) shift symmetries appear to avoid this problem. The covariant Kähler anomalies involve tensors whic...

1999
Michael Faux Dieter Lüst Burt A. Ovrut

A systematic program is developed for analyzing and cancelling local anomalies on networks of intersecting orbifold planes in the context of M -theory. Through a delicate balance of factors, it is discovered that local anomaly matching on the lowerdimensional intersection of two orbifold planes may require twisted matter on those planes which do not conventionally support an anomaly (such as od...

Journal: :Computers & Electrical Engineering 2009
M. Ali Aydin A. Halim Zaim K. Gökhan Ceylan

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known a...

2011
Marianne A. Azer

Mobile ad hoc networks have recently been the topic of extensive research. The interest in such networks stems from their ability to provide temporary and instant wireless networking solutions in situations where cellular infrastructures are lacking and are expensive or infeasible to deploy. Despite their desirable characteristics, vital problems concerning their security must be solved in orde...

Journal: :Computer Networks 2007
Animesh Patcha

With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most, if not all, intrusion detection systems (IDS) assume the availability of complete and clean audit data. We contend that this assumption is not valid. Factors like noise, mobility of the nodes and the large amount of n...

2010
Irfan Ul Haq Sardar Ali Hassan Khan Syed Ali Khayam

Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today’s Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TCP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, ...

2008
Antonio Dobado Antonio L. Maroto

In the presence of a curved space-time with torsion, the divergence of the leptonic current gets new contributions from the curvature and the torsion in addition to those coming from the electroweak fields. However it is possible to define a new lepton current which is gauge and local Lorentz invariant whose divergence gets no contribution from the torsion. Therefore we argue that torsion does ...

1996
Maurice Dubin Robert K. Soberman

The solar neutrino anomaly, measurements discrepant from predictions of the Standard Solar Model, has existed for over 30 years. Multiple experiments measuring fluxes from several reactions in the hydrogen fusion chain have added to the puzzle. Each of the several elements of the enigma are resolved by recognition of measurements establishing that most of the sun’s fusion must occur near the su...

1993
Luis E. Ibáñez

Four-dimensional strings with the standard model gauge group SU(3)×SU(2)×U(1) give model-dependent predictions for the tree level weak mixing-angle. In t he presence of an extra pseudo-anomalous gaugedU(1)X , the value of the weak angle may be computed purely in terms of the charges of the massless fermions of the theory, independently of the details of the massive string sector. I present the ...

2000
Michael Kachelrieß

The KARMEN experiment observes a time anomaly in events induced by pion decay at rest. This anomaly can be ascribed to the production of a new weakly interacting particle X with mass mX ≈ 34MeV. We show that a recently proposed identification of the X particle with the lightest neutralino χ in the frame work of the MSSM with broken R parity is in contradiction to optical observations of type-II...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید