نتایج جستجو برای: intrusion related gold systems
تعداد نتایج: 2333285 فیلتر نتایج به سال:
in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a highperformance network intrusion detection system that com...
Firouzkuh prospect area is located about 35 km northeast of Torbat-e- Jam, Khorasan Razavi Province. Geology of the area includes metamorphosed rocks of Miankouhi Formation, which has intruded by monzogranitic to dioritic intrusions. The magnetic susceptibility of the intrusive rocks varies from 0 to 43 ´ 10-5 SI and they belong to reduced granitoids of ilmenite series. These rocks are affected...
This contribution illustrates the procedures of calculating rare earth element (REE) patterns of magmatic fluids in equilibrium with granitic melts. These patterns can then be compared to those of altered and (or) mineralized rocks in order to investigate the source of the ore-fluids. This technique is applied to the Lake George Sb-Au-W-Mo mineral deposit, New Brunswick, Canada. The results sug...
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
Introduction: Piped water systems are considered to be the gold standard for drinking water according to the Joint Water Monitoring Study. However, poor maintenance of distribution pipes, intermittency of water supply, and sewage water intrusion have contributed to a number of water-borne disease episodes in developed and developing countries. Methods: This study investigated the risk burden r...
With the rapid development and comprehensive application of network technology, network security problems gradually appear serious. Traditional firewall technologies can’t provide sufficient security protection against various attacks and intrusions (Anderson, 1980), while intrusion detection systems (IDS) are faced with compromise between false alarms and false positives (Denning, 1987). In th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید