Academic literature on the topic 'Intrusion'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intrusion"
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka, and C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)." Canadian Journal of Earth Sciences 59, no. 3 (March 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Full textSpenceley, Anna, and Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women." Behavioural and Cognitive Psychotherapy 25, no. 4 (October 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Full textWilson, Penelope I. R., Ken J. W. McCaffrey, and Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah." Geosphere 15, no. 4 (June 24, 2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Full textRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte, and S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm." Psychological Medicine 46, no. 12 (June 23, 2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Full textROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway." Geological Magazine 135, no. 2 (March 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Full textHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN, and ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland." Geological Magazine 150, no. 5 (February 22, 2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Full textCanhimbue, Ludmila, and Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region." Minerals 13, no. 6 (May 24, 2023): 719. http://dx.doi.org/10.3390/min13060719.
Full textHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter, and Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah." Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, no. 1-2 (March 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Full textPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (October 31, 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (May 5, 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textDissertations / Theses on the topic "Intrusion"
Olsson, Fredrik. "Intrusion Management." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-794.
Full textInformation security is tasked with protecting the confidentiality, integrity, and availability of an organizations information resource. A key aspect in protecting these resources is developing an
understanding of the threats, vulnerabilities, and exposures that they face by using Risk Management.
The objective of Risk Management is to identify, quantify and manage information security risks to achieve organizations objectives through a number of tasks utilizing key Risk Management techniques.
Risk Management is a process that ensures that the impact of threats exploiting vulnerabilities is within acceptable limits and at an acceptable cost.
With the increased complexity of modern dynamic networks, traditional defence mechanisms are failing and as a result cyber crime is on the rise [FBI03]. This puts organizations and corporations at risk as the defences are ill-fitted and weak [KBM04].
No information system can be absolutely secure, especially large and complex systems. Embedded security works for isolated, dedicated systems with few users but does not offer cost effective security, and even worse does not always handle security based on a real threat (this is manly due to it inherent inflexibility). A military strategy within the field of information operations suggests a method of information superiority bases on the OODA-loop. This theses propose a method of information security protection based on a combination of risk management techniques and information operation (foremost the OODA-loop). This is in order to ensure a cost effective and a viable future for information security in large
and complex systems, where the war at least at present time is lost to the “black hats”, a term often used to describe a menaced hacker.
Jim, Nilsson. "Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina)." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548.
Full textI hela världen finns det många exempel där stelnade magmatiska intrusioner påverka ett områdes vatten och energiförsörjning, på grund av att intrusioner kan agera som ledare och reservoarer men också som barriärer för vätskor och gaser in marken. Den avgörande faktorn mellan ledare och barriärer i en intrusion är dess spricknätverk. Därför är det viktigt att kartlägga och karakterisera en intrusions spricknätverk och därmed också få en uppfattning om dess permeabilitet. Magmatiska intrusioner är förutom genom borrhål ofta svåråtkomliga, det finns därför väldigt lite information om hur de påverkar akviferer och reservoarer i marken. Det är därför viktigt att öka kunskapen om magmatiska intrusioner genom att undersöka intrusionerna som är tillgängliga vid markytan. I denna studie har bilder från en fallstudie om Sosa Intrusionen använts för att kartera och karakterisera sprickor i Sosa intrusionen. Det är en vertikal magmatisk intrusion som är synlig på markytan, och en del av Chachahuén vulkan komplexet i sydvästra Argentina. Bilderna som användes är tagna med en UAV( unmanned aerial vehicle), och för att analysera bilderna, kartera sprickorna och producera resultaten, användes programmen Agisoft Metashape, MOVE™ och MATLAB med FracPaQ verktyget. Intrusionen har två distinkta sprickgrupper, en som är vinkelrät mot intrusionens kanter och en som går parallellt med kanterna. Konnektivitet mellan sprickorna är låg och eftersom permeabiliteten påverkas av konnektiviteten är den också låg. Sprickgruppen som är vinkelrätt mot intrusionskanten är så kallade kylningssprickor och bildas nät magman i intrusionen svalnar. Det leder till att magman kontraherar och spricker, och bildar sprickor som går inåt mot stelningsgränsen och därmed vinkelrätt mot intrusionskanten. Sprickgruppen som går parallellt med intrusionen bildas av att mineral i magmaströmmen påverkas av friktion från intrusionskanterna. Det gör att mineralen lägger sig och sträcks ut i samma riktning som magmaflödet, vilket när magman stelnar bildar svaghetszoner som sprickor kan fortplanta sig i. Dessa sprickgrupper har låg konnektivitet vilket gör att slutsatsen blir att det karterade området av Sosa intrusionen har låg permeabilitet.
Ferreira, Eduardo Alves. "Detecção autônoma de intrusões utilizando aprendizado de máquina." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/.
Full textThe use of computers to automatically perform operational tasks is commonplace, thanks to the information technology evolution. The maintenance of computer systems, on the other hand, is commonly performed manually, resulting in high costs, low productivity and low quality of service. The Autonomous Computing initiative aims to approach this limitation, through selfmanagement of computer systems. In order to assemble a fully autonomous system, an intrusion detection application is needed to monitor the behavior and data flows on applications. Considering this context, an autonomous Web intrusion detection system is proposed, based on machine-learning techniques with near-linear computational complexity. This system is based on clustering and novelty detection techniques, characterizing an application behavior, to later pinpoint anomalies in live applications. By conducting experiments, we observed that this new approach is capable of detecting anomalies with less dependency on specific contexts than previous solutions
Stefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.
Full textChatprechakul, Nattapron. "Improving performance of distributed network intrusion intrusion detection systems using mobile agents." Thesis, Cranfield University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423508.
Full textChevalier, Ronny. "Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0003.
Full textComputing platforms, such as embedded systems or laptops, are built with layers of preventive security mechanisms to reduce the likelihood of attackers successfully compromising them. Nevertheless, given time and despite decades of improvements in preventive security, intrusions still happen. Therefore, systems should expect intrusions to occur, thus they should be built to detect and to survive them.Commodity Operating Systems (OSs) are deployed with intrusion detection solutions, but their ability to survive them is limited. State-of-the-art approaches from industry or academia either involve manual procedures, loss of availability, coarse-grained responses, or non-negligible performance overhead. Moreover, low-level components, such as the BIOS, are increasingly targeted by sophisticated attackers to implant stealthy and resilient malware. State-of-the-art solutions, however, mainly focus on boot time integrity, leaving the runtime part of the BIOS—known as the System Management Mode (SMM)—a prime target.This dissertation shows that we can build platforms that detect intrusions at the BIOS level and survive intrusions at the OS level. First, by demonstrating that intrusion survivability is a viable approach for commodity OSs. We develop a new approach that address various limitations from the literature, and we evaluate its security and performance. Second, by developing a hardware-based approach that detects attacks at the BIOS level where we demonstrate its feasibility with multiple detection methods
Vigo, John Louis Jr. "Wireless Intrusion Detection Sytem." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/203.
Full textWeigert, Stefan. "Community-Based Intrusion Detection." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-217677.
Full textJacoby, Grant Arthur. "Battery-Based Intrusion Detection." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/27092.
Full textPh. D.
Jacoby, Grant A. "Battery-based intrusion detection /." This resource online, 2005. http://scholar.lib.vt.edu/theses/available/etd-04212005-120840.
Full textBooks on the topic "Intrusion"
Intrusion. London: Orbit, 2012.
Find full textIntrusion. Paris: Pocket, 2012.
Find full textIntrusion. Bloomington, Indiana]: Xlibris, 2014.
Find full textAlien intrusion. Green Forest, AR: Master Books, 2004.
Find full textSengupta, Nandita, and Jaya Sil. Intrusion Detection. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6.
Full textIntrusion detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.
Find full textLaw Reform Commission of Canada. Criminal intrusion. Ottawa, Canada: The Commission, 1986.
Find full textThe intrusion. [United States]: Innovo Publishing, 2010.
Find full textOlgin, Howard. Remote intrusion. New York: Dell Book, 1996.
Find full textCriminal intrusion. Ottawa: Law Reform Commission of Canada, 1986.
Find full textBook chapters on the topic "Intrusion"
Weik, Martin H. "intrusion." In Computer Science and Communications Dictionary, 833. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9555.
Full textSengupta, Nandita, and Jaya Sil. "Introduction." In Intrusion Detection, 1–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_1.
Full textSengupta, Nandita, and Jaya Sil. "Discretization." In Intrusion Detection, 27–46. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_2.
Full textSengupta, Nandita, and Jaya Sil. "Data Reduction." In Intrusion Detection, 47–82. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_3.
Full textSengupta, Nandita, and Jaya Sil. "Q-Learning Classifier." In Intrusion Detection, 83–111. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_4.
Full textSengupta, Nandita, and Jaya Sil. "Conclusions and Future Research." In Intrusion Detection, 113–18. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_5.
Full textYi, Myung-Kyu, and Chong-Sun Hwang. "Intrusion-Tolerant Intrusion Detection System." In Intelligence and Security Informatics, 476–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25952-7_38.
Full textBace, Rebecca Gurley. "Intrusion Detection and Intrusion Prevention Devices." In Computer Security Handbook, 27.1–27.18. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch27.
Full textPerez, André. "Intrusion Detection." In Network Security, 237–51. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch10.
Full textHaberlandt, Karl. "Intrusion Errors." In Encyclopedia of Clinical Neuropsychology, 1353–54. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-0-387-79948-3_1131.
Full textConference papers on the topic "Intrusion"
Järvinen, V., and T. Halkoaho. "Formation of poikilitic chromite in the basal dunite series of the 2.44 Ga Näränkävaara layered intrusion." In Project KO5125 ARLIN Arctic Layered Intrusions as a Source of Critical Metals for Green Economy European Neighbourhood Instrument Cross-Border Cooperation Programme Kolarctic 2014-2020. GI KSC RAS, 2022. http://dx.doi.org/10.31241/arlin.2022.004.
Full textBulegenov, Kanat, Sayat Rais, and Daulet Muratkhanov. "GEOLOGY OF PERMIAN GRANITES OF THE KARATAU-NARYN ZONE AND THEIR PROSPECTIVE FOR RARE METALS (SOUTH KAZAKHSTAN)." In 23rd SGEM International Multidisciplinary Scientific GeoConference 2023. STEF92 Technology, 2023. http://dx.doi.org/10.5593/sgem2023/1.1/s01.07.
Full textSilva Neto, Manuel Gonçalves da, and Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Full textPrasad, Romesh, and Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.
Full textS. P, Sujini, AnbuShamini G. N, and Prija J. S. "Deep Intrusion Detection for DOS and DDOS Attacks Using LSTM and Deep Autoencoder Neural Network." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qkfn6548/ngcesi23p93.
Full textElaeraj, Ouafae, and Cherkaoui Leghris. "The Evolution of Vector Machine Support in the Field of Intrusion Detection Systems." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111817.
Full textLowe, Ryan J. "A Laboratory Study of the Velocity Structure in an Intrusive Gravity Current." In ASME 2000 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/imece2000-2088.
Full textCastanhel, Gabriel Ruschel, Tiago Heinrich, Fabrício Ceschin, and Carlos A. Maziero. "Sliding Window: The Impact of Trace Size in Anomaly Detection System for Containers Through Machine Learning." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15203.
Full textGuimaraes, Mario, and Meg Murray. "Overview of intrusion detection and intrusion prevention." In the 5th annual conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1456625.1456638.
Full textAnand, Vijay. "Intrusion Detection." In the 2014 ACM SIGUCCS Annual Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2661172.2661186.
Full textReports on the topic "Intrusion"
Pilny, Julia. Investigating Network Intrusion. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada412544.
Full textTomko, Albert A., Christian J. Rieser, Louis H. Buell, David R. Zaret, and William M. Turner. Wireless Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada466332.
Full textBace, Rebecca, and Peter Mell. Intrusion detection systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-31.
Full textSchnackenberg, Dan, Harley Holliday, Travis Reid, Kelly Bunn, and Dan Sterne. Automatic Response to Intrusion. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada408394.
Full textGiffin, Jonathan T., David Dagon, Somesh Jha, Wenke Lee, and Barton P. Miller. Environment-Sensitive Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada448428.
Full textRodriguez, J. R., J. C. Matter, and B. Dry. Interior intrusion detection systems. Office of Scientific and Technical Information (OSTI), October 1991. http://dx.doi.org/10.2172/5977693.
Full textCowles, Robert D. Intrusion Detection and Physics. Office of Scientific and Technical Information (OSTI), February 1999. http://dx.doi.org/10.2172/10009.
Full textFirth, Robert, Gary Ford, Barbara Fraser, John Kochmar, and Suresh Konda. Detecting Signs of Intrusion. Fort Belvoir, VA: Defense Technical Information Center, August 1997. http://dx.doi.org/10.21236/ada329629.
Full textWu, Thomas, Michael Malkin, and Dan Boneh. Building Intrusion Tolerant Applications. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada387165.
Full textHinkebein, T. E., S. J. Bauer, B. L. Ehgartner, J. K. Linn, J. T. Neal, J. L. Todd, P. S. Kuhlman, C. T. Gniady, and H. N. Giles. Gas intrusion into SPR caverns. Office of Scientific and Technical Information (OSTI), December 1995. http://dx.doi.org/10.2172/206492.
Full text