Journal articles on the topic 'Intrusion'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intrusion.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka, and C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)." Canadian Journal of Earth Sciences 59, no. 3 (March 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Full textSpenceley, Anna, and Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women." Behavioural and Cognitive Psychotherapy 25, no. 4 (October 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Full textWilson, Penelope I. R., Ken J. W. McCaffrey, and Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah." Geosphere 15, no. 4 (June 24, 2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Full textRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte, and S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm." Psychological Medicine 46, no. 12 (June 23, 2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Full textROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway." Geological Magazine 135, no. 2 (March 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Full textHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN, and ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland." Geological Magazine 150, no. 5 (February 22, 2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Full textCanhimbue, Ludmila, and Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region." Minerals 13, no. 6 (May 24, 2023): 719. http://dx.doi.org/10.3390/min13060719.
Full textHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter, and Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah." Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, no. 1-2 (March 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Full textPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (October 31, 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (May 5, 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textLiu, Gui Guo. "Intrusion Detection Systems." Applied Mechanics and Materials 596 (July 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Full textAmirah and Ahmad Sanmorino. "Deteksi Intrusi Siber pada Sistem Pembelajaran Elektronik berbasis Machine Learning." Jurnal Ilmiah Informatika Global 14, no. 2 (August 3, 2023): 12–16. http://dx.doi.org/10.36982/jiig.v14i2.3227.
Full textBoyd, R., and W. A. Ashcroft. "Significance of the cumulate mineralogy of the Belhelvie mafic-ultramafic intrusion—comments on: Silicate mineralogy of the Belhelvie cumulates, NE Scotland, by W. J. Wadsworth." Mineralogical Magazine 56, no. 384 (September 1992): 329–33. http://dx.doi.org/10.1180/minmag.1992.056.384.04.
Full textMcKenzie, Thomas Levy. "The New Intrusion Tort: The News Media Exposed?" Victoria University of Wellington Law Review 45, no. 1 (August 1, 2014): 79. http://dx.doi.org/10.26686/vuwlr.v45i1.4968.
Full textTHÓRARINSSON, SIGURJÓN B., PAUL M. HOLM, SEBASTIAN TAPPE, LARRY M. HEAMAN, and NIELS-OLE PRÆGEL. "U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland: constraints on the Iceland hotspot track during the rift-to-drift transition." Geological Magazine 153, no. 1 (July 3, 2015): 128–42. http://dx.doi.org/10.1017/s0016756815000448.
Full textBryden, James E., Laurel B. Andrew, and Jan S. Fortuniewicz. "Intrusion Accidents on Highway Construction Projects." Transportation Research Record: Journal of the Transportation Research Board 1715, no. 1 (January 2000): 30–35. http://dx.doi.org/10.3141/1715-05.
Full textWilson, Penelope I. R., Robert W. Wilson, David J. Sanderson, Ian Jarvis, and Kenneth J. W. McCaffrey. "Analysis of deformation bands associated with the Trachyte Mesa intrusion, Henry Mountains, Utah: implications for reservoir connectivity and fluid flow around sill intrusions." Solid Earth 12, no. 1 (January 20, 2021): 95–117. http://dx.doi.org/10.5194/se-12-95-2021.
Full textJatti, Ashwini V., and V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review." Restaurant Business 118, no. 6 (June 3, 2019): 60–79. http://dx.doi.org/10.26643/rb.v118i6.7239.
Full textJatti, Ashwini V., and V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review." Restaurant Business 118, no. 7 (July 28, 2019): 50–58. http://dx.doi.org/10.26643/rb.v118i7.7246.
Full textLi, You Guo. "Analysis of the Snort Building Code Based on IDS." Applied Mechanics and Materials 543-547 (March 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textEl Namrawy, Manal Mohamed, Fouad El Sharaby, and Mohamed Bushnak. "Intrusive Arch versus Miniscrew-Supported Intrusion for Deep Bite Correction." Open Access Macedonian Journal of Medical Sciences 7, no. 11 (June 16, 2019): 1841–46. http://dx.doi.org/10.3889/oamjms.2019.332.
Full textSkyttä, P., T. Hermansson, J. Andersson, and P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield." Solid Earth Discussions 3, no. 1 (April 1, 2011): 355–83. http://dx.doi.org/10.5194/sed-3-355-2011.
Full textSkyttä, P., T. Hermansson, J. Andersson, M. Whitehouse, and P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield." Solid Earth 2, no. 2 (October 26, 2011): 205–17. http://dx.doi.org/10.5194/se-2-205-2011.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textShihadeh, Layaly, and Monica Rosselli. "46 Intrusions in Verbal Fluency Tasks in Mild Cognitive Impairment and Dementia: A Longitudinal Analysis." Journal of the International Neuropsychological Society 29, s1 (November 2023): 919. http://dx.doi.org/10.1017/s1355617723011281.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (November 1, 2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textColpron, Maurice, Raymond A. Price, and Douglas A. Archibald. "40Ar/39Ar thermochronometric constraints on the tectonic evolution of the Clachnacudainn complex, southeastern British Columbia." Canadian Journal of Earth Sciences 36, no. 12 (December 1, 1999): 1989–2006. http://dx.doi.org/10.1139/e99-100.
Full textGraves, Lisa V., Heather M. Holden, Emily J. Van Etten, Lisa Delano-Wood, Mark W. Bondi, David P. Salmon, Jody Corey-Bloom, Paul E. Gilbert, and Dean C. Delis. "New Intrusion Analyses on the CVLT-3: Utility in Distinguishing the Memory Disorders of Alzheimer’s versus Huntington’s Disease." Journal of the International Neuropsychological Society 25, no. 08 (May 7, 2019): 878–83. http://dx.doi.org/10.1017/s1355617719000407.
Full textSaleeby, Jason B. "Age and tectonic setting of the Duke Island ultramafic intrusion, southeast Alaska." Canadian Journal of Earth Sciences 29, no. 3 (March 1, 1992): 506–22. http://dx.doi.org/10.1139/e92-044.
Full textSingh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (August 19, 2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Full textKamble, Arvind, and Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems." International Journal of Swarm Intelligence Research 13, no. 3 (July 1, 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Full textYou, Minxin, Wenyuan Li, Houmin Li, Zhaowei Zhang, and Xin Li. "Petrogenesis and Tectonic Significance of the ~276 Ma Baixintan Ni-Cu Ore-Bearing Mafic-Ultramafic Intrusion in the Eastern Tianshan Orogenic Belt, NW China." Minerals 11, no. 4 (March 26, 2021): 348. http://dx.doi.org/10.3390/min11040348.
Full textJacobus, Agustinus, and Edi Winarko. "Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (January 31, 2014): 13. http://dx.doi.org/10.22146/ijccs.3491.
Full textBrunner, Csaba, Andrea Kő, and Szabina Fodor. "An Autoencoder-Enhanced Stacking Neural Network Model for Increasing the Performance of Intrusion Detection." Journal of Artificial Intelligence and Soft Computing Research 12, no. 2 (April 1, 2021): 149–63. http://dx.doi.org/10.2478/jaiscr-2022-0010.
Full textHolm, Paul Martin, Eva Degn Egeberg, and Niels-Ole Prægel. "Multiple syenite intrusions at Kærven, Kangerdlugssuaq, East Greenland: Evidence from the 1986 field work." Bulletin of the Geological Society of Denmark 38 (February 18, 1991): 173–81. http://dx.doi.org/10.37570/bgsd-1990-38-17.
Full textMazhari, Marzieh, Mashallah Khanehmasjedi, Mohsen Mazhary, Nastaran Atashkar, and Vahid Rakhshan. "Dynamics, Efficacies, and Adverse Effects of Maxillary Full-Arch Intrusion Using Temporary Anchorage Devices (Miniscrews): A Finite Element Analysis." BioMed Research International 2022 (October 7, 2022): 1–25. http://dx.doi.org/10.1155/2022/6706392.
Full textMUNROE, J. R., C. VOEGELI, B. R. SUTHERLAND, V. BIRMAN, and E. H. MEIBURG. "Intrusive gravity currents from finite-length locks in a uniformly stratified fluid." Journal of Fluid Mechanics 635 (September 10, 2009): 245–73. http://dx.doi.org/10.1017/s0022112009007563.
Full textAlbers, John R., George N. Kiladis, Thomas Birner, and Juliana Dias. "Tropical Upper-Tropospheric Potential Vorticity Intrusions during Sudden Stratospheric Warmings." Journal of the Atmospheric Sciences 73, no. 6 (May 20, 2016): 2361–84. http://dx.doi.org/10.1175/jas-d-15-0238.1.
Full textŞermet Elbay, Ülkü, Mesut Elbay, Emine Kaya, and Alper Sinanoglu. "Management of an Intruded Tooth and Adjacent Tooth Showing External Resorption as a Late Complication of Dental Injury: Three-Year Follow-Up." Case Reports in Dentistry 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/741687.
Full textHaslett, Simon K. "Magnetic survey of a monchiquite intrusion in central Gwent." Geological Magazine 127, no. 6 (November 1990): 591–92. http://dx.doi.org/10.1017/s001675680001548x.
Full textGan, Weibing, Sheng Li, Zhengying Li, and Lizhi Sun. "Identification of Ground Intrusion in Underground Structures Based on Distributed Structural Vibration Detected by Ultra-Weak FBG Sensing Technology." Sensors 19, no. 9 (May 9, 2019): 2160. http://dx.doi.org/10.3390/s19092160.
Full textLin, Qingyuan, Rui Ming, Kailing Zhang, and Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach." Security and Communication Networks 2022 (October 10, 2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Full textH R, Bhargav. "Comparison of Machine Learning and Deep Learning algorithms for Detecting Intrusions in Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1863–70. http://dx.doi.org/10.22214/ijraset.2022.45588.
Full textO'Driscoll, B. "The Centre 3 layered gabbro intrusion, Ardnamurchan, NW Scotland." Geological Magazine 144, no. 6 (September 21, 2007): 897–908. http://dx.doi.org/10.1017/s0016756807003846.
Full textZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textDE ROOIJ, FRANS, P. F. LINDEN, and STUART B. DALZIEL. "Saline and particle-driven interfacial intrusions." Journal of Fluid Mechanics 389 (June 25, 1999): 303–34. http://dx.doi.org/10.1017/s0022112099005078.
Full textReshmi, B. M., S. S. Manvi, and Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks." Mobile Information Systems 2, no. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Full textYu, Jie, Guo Xiang Yao, and Wei Wei Zhang. "Intrusion Detection Method Based on Frequent Pattern." Advanced Materials Research 204-210 (February 2011): 1751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1751.
Full textFletcher, Keaton A., and Wendy L. Bedwell. "An Initial Look at the Effects of Interruptions On Strain." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 1269–73. http://dx.doi.org/10.1177/1541931213601295.
Full text