نتایج جستجو برای: ids
تعداد نتایج: 5339 فیلتر نتایج به سال:
member of the teaching staff in yazd university. the musha'sha'ids'uprising in south region of mesopotamia and khoozestan was performed under the sayyid mohammad b.falah's leadership (died in 870 a.h.) and then shiite's centeral government under the centerality of hoveizeh was established. until now, we don,t have considerable works about sayyid mohammad b.falah's ...
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...
wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus...
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
Biodegradation tests according to Organization for Economic Cooperation and Development standard 301F (manometric respirometry test) with technical iminodisuccinate (IDS) revealed ready biodegradability for all stereoisomers of IDS. The IDS-degrading strain Agrobacterium tumefaciens BY6 was isolated from activated sludge. The strain was able to grow on each IDS isomer as well as on Fe(2+)-, Mg(...
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such resource sharing, extensive connectivity, and agility deploying new applications pose security risks that are increasingly exploited. New technologies like container platforms require IDS to evolve effectively detect intrusive activities these ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید