نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

Journal: :زمین شناسی اقتصادی 0
فرید مر صالح دیمر بتول تقی پور

most skarn deposits are directly related to magmatic activity, and there is a systematic correlation between composition of causative plutons and the metal contents of the related skarns. darreh zerreshk deposit is located in southwest of yazd. petrological and geochemical studies show that darreh zerreshk granitoid ranges in composition from granite through quartz monzodiorite and has subalkal...

1998
Phillip A. Porras Stuart Staniford-Chen Brian Tung

As intrusions and other attacks become more widespread and more sophisticated, it becomes beyond the scope of any one intrusion detection and response (ID&R) system to deal with them. The need thus arises for systems to cooperate with one another, to manage diverse attacks across networks and time. Heretofore, eeorts toward \cooperation" have focused primarily on homogeneous components, with li...

2002
G. A. Fink B. L. Chappell T. G. Turner

This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...

1997

Surface geological and geochemical mapping have been key technical contributors to many gold discoveries over the past 25 years. However, in the last ten years there has been a growing emphasis on using geophysical techniques to compliment them in covered terrains. As the search for gold deposits under covered areas expands, there will be increasing emphasis on integrating the geoscientific dis...

1998
Giovanni Vigna Richard A. Kemmerer

Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to the network itself. Network-based intrusion detection is challenging because network auditing produces large amounts of data, and different events related to a single intrusion may be visible in different places on th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

2002
David Sames Brian Matt Brian Niebuhr Gregg Tally Brent Whitmore David E. Bakken

Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object Systems (ITDOS) research project is developing an architecture for a heterogeneous intrusion tolerant distributed object system. ITDOS integrates a Byzantine Fault Tolerant multicast protocol into an open...

2001
JoAnne Nelson

This report describes a new mapping project in the Cassiar Mountains, located 70 kilometres northeast of Dease Lake in northern British Columbia. The area is attractive for two reasons. First, it contains rocks that are likely correlative with those of the Yukon-Tanana Terrane, a tract with known volcanogenic massive sulphide potential. Second, combined geological and regional geochemical data ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید