نتایج جستجو برای: intrusion
تعداد نتایج: 18427 فیلتر نتایج به سال:
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
Existence of outflow intrusion introduces small-scale turbulence that perturbs the vertically stratified character of the sound velocity and causes spatial and temporal fluctuations of the sound propagation. In this experimental study, we have investigated acoustic wave propagation with frequency of 50 kHz in a pre-stratified environment with intrusion of a turbulent plume while the si...
by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
The Miocene Qohrud granitoid intrusion consists of granite, granodiorite and tonalite and is located in the Urmia-Dokhtar magmatic belt. Intrusion of magmatic rocks into the various sedimentary rocks including shale, sandstone, limestone and marl, with Jurassic to Eocene age, has caused contact metamorphism of the surrounded rocks. Varity of hornfelses and skarns are formed in this regards. Hyd...
Owing to population growth and water demand, coastal aquifers all over the world are over–pumped, resulting in serious problems such as saltwater intrusion. So, in these conditions, assessing the groundwater system’s vulnerability and finding areas with saltwater intrusion potential are vital for the better management of aquifers. In this study, AHP-GALDIT was applied to saltwater intrusion vul...
the neogene intrusion masses in the noudeh-enghelab area located to the north of sabzevar ophiolite have cut the late cretaceous ophiolitic rocks, sedimentary- volcanic and eocene volcanic rocks and have been covered by pliocene and quaternary deposits. the margin is of lava with basalt, phyric andesite-basalt and andesite and the central parts (dome shaped) composed of phyric andesite-trachyan...
energy consumption is considered as a critical issue in wireless sensor networks (wsns). batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. an efcient solution to improve energy consumption and even trafc in wsns is data aggregation (da) that can reduce the number of transmissions. two main challenges for da are: (i)...
An intrusion response system is charged with minimizing any losses caused by intrusion. It remains ineffective if the response to the intrusion does not bring the timely and adequate corrections required by the victim system. This paper proposes a new intrusion response system based on contextual fuzzy cognitive map. In this intrusion response system framework, a new ontology is defined based u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید