نتایج جستجو برای: sargaz granitic intrusion

تعداد نتایج: 19974  

2017
Christoph Schmidt Jean Pierre Tchouankoue Peguy Noel Nkouamen Nemzoue Félicité Ayaba Siggy Signe Nformidah-Ndah Emmanuel Nformi Chifu

Nyos maar is located in the Cameroon Volcanic Line and generates a multitude of primary and secondary hazards to the local population. For risk assessment and hazard mitigation, the age of the Nyos maar eruption provides some vital information. Since previous dating efforts using a range of techniques resulted in vastly varying eruption ages, we applied thermoluminescence (TL) methods to obtain...

Journal: :CoRR 2012
Rajdeep Borgohain

-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics i...

2003
Mikhail Gordeev

Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...

2015
Francisco Bolivar

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

Journal: :journal of advances in computer research 2013
s.mobarakeh moosavirad peyman kabiri hamidreza mahini

intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...

2014
Manoj Sharma Keshav Jindal

The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...

Journal: :International Journal of Rock Mechanics and Mining Sciences 2020

Journal: :Geological Society of America Bulletin 1901

Journal: :Nonlinear Processes in Geophysics 2007

Journal: :CoRR 2011
Hichem Sedjelmaci Mohammed Feham

Network security is one of the major concerns of studies have been conducted on the intrusion detection system. Cluster-based Wireless A novel hybrid intrusion detection method method for wireless sensor networks. Accepted papers & International Conference on Advanced Wireless, Paper title:A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. Paper title: A Novel Cluster He...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید