نتایج جستجو برای: alert correlation
تعداد نتایج: 403255 فیلتر نتایج به سال:
Near-real time altimetry products from ENVISAT RA2, Jason 1 and Topex/Poseidon tandem mission are validated for the North Sea and Baltic Sea region to assess the feasibility of using the data for operational purposes. The coverage of the satellite data shows that all Jason 1 and Topex/Poseidon observations in the Baltic Sea are currently discarded in the processing of the data. The spatial scal...
In 1977 Hartwig and Luh asked whether an element a in a Dedekind-finite ring R satisfying aR = a2R also satisfies Ra = Ra2. In this paper, we answer this question in the negative. We also prove that if a is an element of a Dedekind-finite exchange ring R and aR = a2R, then Ra = Ra2. This gives an easier proof of Dischinger’s theorem that left strongly π-regular rings are right strongly π-regula...
Perhaps the last major effort to save the world’s great apes from extinction has been launched at a recent meeting held in the Democratic Republic of the Congo, one of 23 home states of the great apes. The meeting included an unusually broad range of interests for a conservation issue, with businesses, industry and communities joining up with scientists, environmental agencies and UN bodies to ...
Treatment techniques and tools to address alcohol use disorders (AUDs)* have multiplied over the last 30 years, moving beyond models based on Alcoholics Anonymous and its offshoot, the Minnesota Model. Care providers now can prescribe medications to aid people as they work to reduce their drinking. If a traditional mutualhelp group model of care does not appeal to a patient, he or she has other...
Data security and privacy are perennial concerns related to cloud migration, whether it is about applications, business or customers. In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. It is a defensive formation of collaborative IDPS components with dynamically ...
Network Intrusion Detection Systems (NIDS) are popular components for a fast detection of network attacks and intrusions, but their efficacy is limited by the high numbers of false alarms that affect them. As a consequence, system administrators, that have to manually manage an overwhelming amount of intrusion alerts, tend to decrease the alarm threshold or even to deactivate most NIDS function...
Network-centric computing systems manifest as Grids, clusters, Intranets, LANs, or P2P networks, etc. These distributed systems are subject to security breaches in an open network environment. Conventional intrusion detection systems (IDS) use the misuse model at the packet level. An anomaly detection system (ADS) follows a normal-use model at Internet connection level. We integrate these two a...
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that ...
PURPOSE Gather data on incidence of canine alerting/responding behavior with a defined patient population. Research development and use of purported alerting dogs. METHODS Review of the literature was performed. A qualitative questionnaire was completed by epilepsy patients. Service dog trainers were identified. RESULTS Of 63 patients, 29 owned pet dogs. Nine reported their dog responded to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید