نتایج جستجو برای: sargaz granitic intrusion
تعداد نتایج: 19974 فیلتر نتایج به سال:
Nyos maar is located in the Cameroon Volcanic Line and generates a multitude of primary and secondary hazards to the local population. For risk assessment and hazard mitigation, the age of the Nyos maar eruption provides some vital information. Since previous dating efforts using a range of techniques resulted in vastly varying eruption ages, we applied thermoluminescence (TL) methods to obtain...
-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics i...
Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...
As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...
intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...
The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...
Network security is one of the major concerns of studies have been conducted on the intrusion detection system. Cluster-based Wireless A novel hybrid intrusion detection method method for wireless sensor networks. Accepted papers & International Conference on Advanced Wireless, Paper title:A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. Paper title: A Novel Cluster He...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید