نتایج جستجو برای: خدمات alert
تعداد نتایج: 38359 فیلتر نتایج به سال:
Within the past decade an unusual decline of black walnut (Juglans nigra) has been observed in several western states. Initial symptoms involve a yellowing and thinning of the upper crown, which progresses to include death of progressively larger branches (Figure 1). During the final stages large areas of foliage may rapidly wilt. Trees often are killed within three years after initial symptoms...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the significant criteria in each technique that can improve the Intrusion Detection System (IDS) problem suc...
OBJECTIVES Unnecessary duplicate laboratory testing is common and costly. Systems-based means to avert unnecessary testing should be investigated and employed. METHODS We compared the effectiveness and cost savings associated with two clinical decision support tools to stop duplicate testing. The Hard Stop required telephone contact with the laboratory and justification to have the duplicate ...
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful supercomputers: using logs representing over 746 million processor-hours, in which anomalous events called alerts were manually tagged for scoring, we aim to automatically identify the regions of the log containing those aler...
Large-scale network attacks will bring great damage to the network. Although the existing detection systems are able to detect a large number of known attacks, when facing large-scale network attacks, log data generated by these systems usually increases rapidly, which forms vast amount of alert information in a short period of time. This paper researches on picking up alert information efficie...
Near-real time altimetry products from ENVISAT RA2, Jason 1 and Topex/Poseidon tandem mission are validated for the North Sea and Baltic Sea region to assess the feasibility of using the data for operational purposes. The coverage of the satellite data shows that all Jason 1 and Topex/Poseidon observations in the Baltic Sea are currently discarded in the processing of the data. The spatial scal...
This paper presents the results of the project MIAU, a data mining approach for intrusion detection alert correlation. MIAU combines different data mining techniques in order to properly solve some existing problems in the management and analysis of alerts generated by actual intrusion detection systems. Some of these data mining methods and their application to MIAU are introduced in this pape...
In 1977 Hartwig and Luh asked whether an element a in a Dedekind-finite ring R satisfying aR = a2R also satisfies Ra = Ra2. In this paper, we answer this question in the negative. We also prove that if a is an element of a Dedekind-finite exchange ring R and aR = a2R, then Ra = Ra2. This gives an easier proof of Dischinger’s theorem that left strongly π-regular rings are right strongly π-regula...
Perhaps the last major effort to save the world’s great apes from extinction has been launched at a recent meeting held in the Democratic Republic of the Congo, one of 23 home states of the great apes. The meeting included an unusually broad range of interests for a conservation issue, with businesses, industry and communities joining up with scientists, environmental agencies and UN bodies to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید