نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

Journal: :journal of sciences islamic republic of iran 0

the gandy gold-base metal deposit is located in tertiary torud-chahshirin volcano-plutonic range, north of central iran. various styles of gold mineralization occur throughout the range. mineralization at gandy occurs in close spatial relation with rhyolitic domes in a caldera setting in a series of narrow brecciated veins. two mineralogically and spatially different argillic alterations have a...

2015
J. K. Kalita

Consequently, Intrusion Detection Systems (IDS) are quickly becoming a Intrusion Detection System Using Ontology and Clustering Techniques, Book Title. NIDS solutions offer sophisticated, real-time intrusion detection capabilities often Though this method takes time to set up, as baselining requires the NIDS. State-of-the-art intrusion detection, prevention and reaction simulation systems analy...

رحیمی, بهنام, مظاهری, سید احمد, کریم‌پور, محمد حسن, قادری, مجید , قوی, جمال ,

Tarikdarreh prospect area is situated in northeastern Iran at the boundary between Central Iran and Kopet-Dagh structural zones. Torbat-e-Jam granitoid intrusion of Triassic age is the main magmatic display in the district. These plutonic rocks with NW-SE trending intruded Miankouhi Formation (Upper Triassic) consisting of coaly shale, siltstone and sandstone converting those to hornfels for te...

2015
Francisco Bolivar

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

Journal: :زمین شناسی اقتصادی 0

isotopic and microthermometry results from sheikh-darabad cu-au indices in mianeh region, east-azarbaijan province, indicate cenozoic post-magmatic activities with developed adularia facies through an extended and neogene related alteration that is given rise to occurring silica vein systems as the main hosting locations for epithermal mineralization. the research evidence also has been coincid...

Journal: :Appl. Soft Comput. 2010
Shelly Xiaonan Wu Wolfgang Banzhaf

Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed and error resilience in the face of noisy information fit the requirements of building a good intrusion detection model. Here we want to provi...

2015
Abhishek Sawant Jyoti Yadav Avneet Kaur Arora Janhavi Deo

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

2008
Marjan Kuchaki Rafsanjani Ali Movaghar Faroukh Koroupi

As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not en...

2012
Haoyang Xie Keyu Jiang Xiaohong Yuan Hongbiao Zeng

Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains all of the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This pape...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید