Artículos de revistas sobre el tema "Intrusion"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Intrusion".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka y C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)". Canadian Journal of Earth Sciences 59, n.º 3 (marzo de 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Texto completoSpenceley, Anna y Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women". Behavioural and Cognitive Psychotherapy 25, n.º 4 (octubre de 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Texto completoWilson, Penelope I. R., Ken J. W. McCaffrey y Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah". Geosphere 15, n.º 4 (24 de junio de 2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Texto completoRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte y S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm". Psychological Medicine 46, n.º 12 (23 de junio de 2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Texto completoROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway". Geological Magazine 135, n.º 2 (marzo de 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Texto completoHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN y ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland". Geological Magazine 150, n.º 5 (22 de febrero de 2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Texto completoCanhimbue, Ludmila y Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region". Minerals 13, n.º 6 (24 de mayo de 2023): 719. http://dx.doi.org/10.3390/min13060719.
Texto completoHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter y Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah". Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, n.º 1-2 (marzo de 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Texto completoPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection". International Journal for Research in Applied Science and Engineering Technology 11, n.º 10 (31 de octubre de 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Texto completoSolomon, Irin Anna, Aman Jatain y Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning". Asian Journal of Computer Science and Technology 8, n.º 2 (5 de mayo de 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Texto completoLiu, Gui Guo. "Intrusion Detection Systems". Applied Mechanics and Materials 596 (julio de 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Texto completoAmirah y Ahmad Sanmorino. "Deteksi Intrusi Siber pada Sistem Pembelajaran Elektronik berbasis Machine Learning". Jurnal Ilmiah Informatika Global 14, n.º 2 (3 de agosto de 2023): 12–16. http://dx.doi.org/10.36982/jiig.v14i2.3227.
Texto completoBoyd, R. y W. A. Ashcroft. "Significance of the cumulate mineralogy of the Belhelvie mafic-ultramafic intrusion—comments on: Silicate mineralogy of the Belhelvie cumulates, NE Scotland, by W. J. Wadsworth". Mineralogical Magazine 56, n.º 384 (septiembre de 1992): 329–33. http://dx.doi.org/10.1180/minmag.1992.056.384.04.
Texto completoMcKenzie, Thomas Levy. "The New Intrusion Tort: The News Media Exposed?" Victoria University of Wellington Law Review 45, n.º 1 (1 de agosto de 2014): 79. http://dx.doi.org/10.26686/vuwlr.v45i1.4968.
Texto completoTHÓRARINSSON, SIGURJÓN B., PAUL M. HOLM, SEBASTIAN TAPPE, LARRY M. HEAMAN y NIELS-OLE PRÆGEL. "U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland: constraints on the Iceland hotspot track during the rift-to-drift transition". Geological Magazine 153, n.º 1 (3 de julio de 2015): 128–42. http://dx.doi.org/10.1017/s0016756815000448.
Texto completoBryden, James E., Laurel B. Andrew y Jan S. Fortuniewicz. "Intrusion Accidents on Highway Construction Projects". Transportation Research Record: Journal of the Transportation Research Board 1715, n.º 1 (enero de 2000): 30–35. http://dx.doi.org/10.3141/1715-05.
Texto completoWilson, Penelope I. R., Robert W. Wilson, David J. Sanderson, Ian Jarvis y Kenneth J. W. McCaffrey. "Analysis of deformation bands associated with the Trachyte Mesa intrusion, Henry Mountains, Utah: implications for reservoir connectivity and fluid flow around sill intrusions". Solid Earth 12, n.º 1 (20 de enero de 2021): 95–117. http://dx.doi.org/10.5194/se-12-95-2021.
Texto completoJatti, Ashwini V. y V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, n.º 6 (3 de junio de 2019): 60–79. http://dx.doi.org/10.26643/rb.v118i6.7239.
Texto completoJatti, Ashwini V. y V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, n.º 7 (28 de julio de 2019): 50–58. http://dx.doi.org/10.26643/rb.v118i7.7246.
Texto completoLi, You Guo. "Analysis of the Snort Building Code Based on IDS". Applied Mechanics and Materials 543-547 (marzo de 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Texto completoSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov y Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks". Программные системы и вычислительные методы, n.º 3 (marzo de 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Texto completoEl Namrawy, Manal Mohamed, Fouad El Sharaby y Mohamed Bushnak. "Intrusive Arch versus Miniscrew-Supported Intrusion for Deep Bite Correction". Open Access Macedonian Journal of Medical Sciences 7, n.º 11 (16 de junio de 2019): 1841–46. http://dx.doi.org/10.3889/oamjms.2019.332.
Texto completoSkyttä, P., T. Hermansson, J. Andersson y P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth Discussions 3, n.º 1 (1 de abril de 2011): 355–83. http://dx.doi.org/10.5194/sed-3-355-2011.
Texto completoSkyttä, P., T. Hermansson, J. Andersson, M. Whitehouse y P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth 2, n.º 2 (26 de octubre de 2011): 205–17. http://dx.doi.org/10.5194/se-2-205-2011.
Texto completoAli, Rashid y Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems". Advanced Materials Research 403-408 (noviembre de 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Texto completoShihadeh, Layaly y Monica Rosselli. "46 Intrusions in Verbal Fluency Tasks in Mild Cognitive Impairment and Dementia: A Longitudinal Analysis". Journal of the International Neuropsychological Society 29, s1 (noviembre de 2023): 919. http://dx.doi.org/10.1017/s1355617723011281.
Texto completoChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang y Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals". Social Behavior and Personality: an international journal 38, n.º 10 (1 de noviembre de 2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Texto completoColpron, Maurice, Raymond A. Price y Douglas A. Archibald. "40Ar/39Ar thermochronometric constraints on the tectonic evolution of the Clachnacudainn complex, southeastern British Columbia". Canadian Journal of Earth Sciences 36, n.º 12 (1 de diciembre de 1999): 1989–2006. http://dx.doi.org/10.1139/e99-100.
Texto completoGraves, Lisa V., Heather M. Holden, Emily J. Van Etten, Lisa Delano-Wood, Mark W. Bondi, David P. Salmon, Jody Corey-Bloom, Paul E. Gilbert y Dean C. Delis. "New Intrusion Analyses on the CVLT-3: Utility in Distinguishing the Memory Disorders of Alzheimer’s versus Huntington’s Disease". Journal of the International Neuropsychological Society 25, n.º 08 (7 de mayo de 2019): 878–83. http://dx.doi.org/10.1017/s1355617719000407.
Texto completoSaleeby, Jason B. "Age and tectonic setting of the Duke Island ultramafic intrusion, southeast Alaska". Canadian Journal of Earth Sciences 29, n.º 3 (1 de marzo de 1992): 506–22. http://dx.doi.org/10.1139/e92-044.
Texto completoSingh, Neha, Deepali Virmani y Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset". International Journal of Computational Intelligence and Applications 19, n.º 03 (19 de agosto de 2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Texto completoKamble, Arvind y Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems". International Journal of Swarm Intelligence Research 13, n.º 3 (1 de julio de 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Texto completoYou, Minxin, Wenyuan Li, Houmin Li, Zhaowei Zhang y Xin Li. "Petrogenesis and Tectonic Significance of the ~276 Ma Baixintan Ni-Cu Ore-Bearing Mafic-Ultramafic Intrusion in the Eastern Tianshan Orogenic Belt, NW China". Minerals 11, n.º 4 (26 de marzo de 2021): 348. http://dx.doi.org/10.3390/min11040348.
Texto completoJacobus, Agustinus y Edi Winarko. "Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time". IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, n.º 1 (31 de enero de 2014): 13. http://dx.doi.org/10.22146/ijccs.3491.
Texto completoBrunner, Csaba, Andrea Kő y Szabina Fodor. "An Autoencoder-Enhanced Stacking Neural Network Model for Increasing the Performance of Intrusion Detection". Journal of Artificial Intelligence and Soft Computing Research 12, n.º 2 (1 de abril de 2021): 149–63. http://dx.doi.org/10.2478/jaiscr-2022-0010.
Texto completoHolm, Paul Martin, Eva Degn Egeberg y Niels-Ole Prægel. "Multiple syenite intrusions at Kærven, Kangerdlugssuaq, East Greenland: Evidence from the 1986 field work." Bulletin of the Geological Society of Denmark 38 (18 de febrero de 1991): 173–81. http://dx.doi.org/10.37570/bgsd-1990-38-17.
Texto completoMazhari, Marzieh, Mashallah Khanehmasjedi, Mohsen Mazhary, Nastaran Atashkar y Vahid Rakhshan. "Dynamics, Efficacies, and Adverse Effects of Maxillary Full-Arch Intrusion Using Temporary Anchorage Devices (Miniscrews): A Finite Element Analysis". BioMed Research International 2022 (7 de octubre de 2022): 1–25. http://dx.doi.org/10.1155/2022/6706392.
Texto completoMUNROE, J. R., C. VOEGELI, B. R. SUTHERLAND, V. BIRMAN y E. H. MEIBURG. "Intrusive gravity currents from finite-length locks in a uniformly stratified fluid". Journal of Fluid Mechanics 635 (10 de septiembre de 2009): 245–73. http://dx.doi.org/10.1017/s0022112009007563.
Texto completoAlbers, John R., George N. Kiladis, Thomas Birner y Juliana Dias. "Tropical Upper-Tropospheric Potential Vorticity Intrusions during Sudden Stratospheric Warmings". Journal of the Atmospheric Sciences 73, n.º 6 (20 de mayo de 2016): 2361–84. http://dx.doi.org/10.1175/jas-d-15-0238.1.
Texto completoŞermet Elbay, Ülkü, Mesut Elbay, Emine Kaya y Alper Sinanoglu. "Management of an Intruded Tooth and Adjacent Tooth Showing External Resorption as a Late Complication of Dental Injury: Three-Year Follow-Up". Case Reports in Dentistry 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/741687.
Texto completoHaslett, Simon K. "Magnetic survey of a monchiquite intrusion in central Gwent". Geological Magazine 127, n.º 6 (noviembre de 1990): 591–92. http://dx.doi.org/10.1017/s001675680001548x.
Texto completoGan, Weibing, Sheng Li, Zhengying Li y Lizhi Sun. "Identification of Ground Intrusion in Underground Structures Based on Distributed Structural Vibration Detected by Ultra-Weak FBG Sensing Technology". Sensors 19, n.º 9 (9 de mayo de 2019): 2160. http://dx.doi.org/10.3390/s19092160.
Texto completoLin, Qingyuan, Rui Ming, Kailing Zhang y Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach". Security and Communication Networks 2022 (10 de octubre de 2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Texto completoH R, Bhargav. "Comparison of Machine Learning and Deep Learning algorithms for Detecting Intrusions in Network". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 1863–70. http://dx.doi.org/10.22214/ijraset.2022.45588.
Texto completoO'Driscoll, B. "The Centre 3 layered gabbro intrusion, Ardnamurchan, NW Scotland". Geological Magazine 144, n.º 6 (21 de septiembre de 2007): 897–908. http://dx.doi.org/10.1017/s0016756807003846.
Texto completoZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing". Wireless Communications and Mobile Computing 2022 (9 de junio de 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Texto completoDE ROOIJ, FRANS, P. F. LINDEN y STUART B. DALZIEL. "Saline and particle-driven interfacial intrusions". Journal of Fluid Mechanics 389 (25 de junio de 1999): 303–34. http://dx.doi.org/10.1017/s0022112099005078.
Texto completoReshmi, B. M., S. S. Manvi y Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks". Mobile Information Systems 2, n.º 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Texto completoYu, Jie, Guo Xiang Yao y Wei Wei Zhang. "Intrusion Detection Method Based on Frequent Pattern". Advanced Materials Research 204-210 (febrero de 2011): 1751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1751.
Texto completoFletcher, Keaton A. y Wendy L. Bedwell. "An Initial Look at the Effects of Interruptions On Strain". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n.º 1 (septiembre de 2016): 1269–73. http://dx.doi.org/10.1177/1541931213601295.
Texto completo