نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

Journal: :dental research journal 0
mostafa abtahi neda eslami reza zare mahmoud abadi saber pooria rezaei

background: there is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. the aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults. materials and methods: patients referred to the department of orthodontics of mashhad university of medical sciences participated in this study. ...

Journal: :J. Inf. Sci. Eng. 2001
Yao-Tsung Lin Shian-Shyong Tseng Shun-Chieh Lin

Due to the rapid growth of networked computer resources and the increasing importance of related applications, intrusions which threaten the infrastructure of these applications have are critical problems. In recent years, several intrusion detection systems designed to identify and detect possible intrusion behaviors. In this work, an intrusion detection model is proposed to for building an in...

Journal: :Journal of Systems and Software 2007
Lih-Chyau Wuu Chi-Hsiang Hung Sout-Fong Chen

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a col...

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

2015
Abhishek Sawant Jyoti Yadav Avneet Kaur Arora Janhavi Deo

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

2011
Kamaruzaman Maskat Mohd Afizi Mohd Shukran Mohammad Adib Khairuddin Mohd Rizal Mohd Isa

Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could only detect the intrusion but could not, on its ...

2013
Guoping Hou Xuan Ma Yuelei Zhang

Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intr...

2003
Jianhua Sun Hai Jin Hao Chen Qian Zhang Zongfen Han

Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. However, the performance of misuse intrusion detection system (MIDS) or anomaly intrusion detection system (AIDS) is not satisfying. In this paper, we study the issue of building a compound intrusion detection model, w...

2010
Zongpu Jia Shichao Jin

This paper analyzes the current situation of the intrusion detection system, which is the basis to put forward that data mining technology is to be applied to the intrusion detection system in terms of the problems of the traditional intrusion detection system. Meanwhile, the paper designs the intrusion detection model of data mining. With the study on intrusion detection and data mining, the a...

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید