Letteratura scientifica selezionata sul tema "Intrusion"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Intrusion".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Intrusion"
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka e C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)". Canadian Journal of Earth Sciences 59, n. 3 (marzo 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Testo completoSpenceley, Anna, e Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women". Behavioural and Cognitive Psychotherapy 25, n. 4 (ottobre 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Testo completoWilson, Penelope I. R., Ken J. W. McCaffrey e Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah". Geosphere 15, n. 4 (24 giugno 2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Testo completoRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte e S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm". Psychological Medicine 46, n. 12 (23 giugno 2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Testo completoROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway". Geological Magazine 135, n. 2 (marzo 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Testo completoHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN e ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland". Geological Magazine 150, n. 5 (22 febbraio 2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Testo completoCanhimbue, Ludmila, e Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region". Minerals 13, n. 6 (24 maggio 2023): 719. http://dx.doi.org/10.3390/min13060719.
Testo completoHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter e Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah". Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, n. 1-2 (marzo 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Testo completoPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection". International Journal for Research in Applied Science and Engineering Technology 11, n. 10 (31 ottobre 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Testo completoSolomon, Irin Anna, Aman Jatain e Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning". Asian Journal of Computer Science and Technology 8, n. 2 (5 maggio 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Testo completoTesi sul tema "Intrusion"
Olsson, Fredrik. "Intrusion Management". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-794.
Testo completoInformation security is tasked with protecting the confidentiality, integrity, and availability of an organizations information resource. A key aspect in protecting these resources is developing an
understanding of the threats, vulnerabilities, and exposures that they face by using Risk Management.
The objective of Risk Management is to identify, quantify and manage information security risks to achieve organizations objectives through a number of tasks utilizing key Risk Management techniques.
Risk Management is a process that ensures that the impact of threats exploiting vulnerabilities is within acceptable limits and at an acceptable cost.
With the increased complexity of modern dynamic networks, traditional defence mechanisms are failing and as a result cyber crime is on the rise [FBI03]. This puts organizations and corporations at risk as the defences are ill-fitted and weak [KBM04].
No information system can be absolutely secure, especially large and complex systems. Embedded security works for isolated, dedicated systems with few users but does not offer cost effective security, and even worse does not always handle security based on a real threat (this is manly due to it inherent inflexibility). A military strategy within the field of information operations suggests a method of information superiority bases on the OODA-loop. This theses propose a method of information security protection based on a combination of risk management techniques and information operation (foremost the OODA-loop). This is in order to ensure a cost effective and a viable future for information security in large
and complex systems, where the war at least at present time is lost to the “black hats”, a term often used to describe a menaced hacker.
Jim, Nilsson. "Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina)". Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548.
Testo completoI hela världen finns det många exempel där stelnade magmatiska intrusioner påverka ett områdes vatten och energiförsörjning, på grund av att intrusioner kan agera som ledare och reservoarer men också som barriärer för vätskor och gaser in marken. Den avgörande faktorn mellan ledare och barriärer i en intrusion är dess spricknätverk. Därför är det viktigt att kartlägga och karakterisera en intrusions spricknätverk och därmed också få en uppfattning om dess permeabilitet. Magmatiska intrusioner är förutom genom borrhål ofta svåråtkomliga, det finns därför väldigt lite information om hur de påverkar akviferer och reservoarer i marken. Det är därför viktigt att öka kunskapen om magmatiska intrusioner genom att undersöka intrusionerna som är tillgängliga vid markytan. I denna studie har bilder från en fallstudie om Sosa Intrusionen använts för att kartera och karakterisera sprickor i Sosa intrusionen. Det är en vertikal magmatisk intrusion som är synlig på markytan, och en del av Chachahuén vulkan komplexet i sydvästra Argentina. Bilderna som användes är tagna med en UAV( unmanned aerial vehicle), och för att analysera bilderna, kartera sprickorna och producera resultaten, användes programmen Agisoft Metashape, MOVE™ och MATLAB med FracPaQ verktyget. Intrusionen har två distinkta sprickgrupper, en som är vinkelrät mot intrusionens kanter och en som går parallellt med kanterna. Konnektivitet mellan sprickorna är låg och eftersom permeabiliteten påverkas av konnektiviteten är den också låg. Sprickgruppen som är vinkelrätt mot intrusionskanten är så kallade kylningssprickor och bildas nät magman i intrusionen svalnar. Det leder till att magman kontraherar och spricker, och bildar sprickor som går inåt mot stelningsgränsen och därmed vinkelrätt mot intrusionskanten. Sprickgruppen som går parallellt med intrusionen bildas av att mineral i magmaströmmen påverkas av friktion från intrusionskanterna. Det gör att mineralen lägger sig och sträcks ut i samma riktning som magmaflödet, vilket när magman stelnar bildar svaghetszoner som sprickor kan fortplanta sig i. Dessa sprickgrupper har låg konnektivitet vilket gör att slutsatsen blir att det karterade området av Sosa intrusionen har låg permeabilitet.
Ferreira, Eduardo Alves. "Detecção autônoma de intrusões utilizando aprendizado de máquina". Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-28072011-160306/.
Testo completoThe use of computers to automatically perform operational tasks is commonplace, thanks to the information technology evolution. The maintenance of computer systems, on the other hand, is commonly performed manually, resulting in high costs, low productivity and low quality of service. The Autonomous Computing initiative aims to approach this limitation, through selfmanagement of computer systems. In order to assemble a fully autonomous system, an intrusion detection application is needed to monitor the behavior and data flows on applications. Considering this context, an autonomous Web intrusion detection system is proposed, based on machine-learning techniques with near-linear computational complexity. This system is based on clustering and novelty detection techniques, characterizing an application behavior, to later pinpoint anomalies in live applications. By conducting experiments, we observed that this new approach is capable of detecting anomalies with less dependency on specific contexts than previous solutions
Stefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.
Testo completoChatprechakul, Nattapron. "Improving performance of distributed network intrusion intrusion detection systems using mobile agents". Thesis, Cranfield University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423508.
Testo completoChevalier, Ronny. "Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches". Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0003.
Testo completoComputing platforms, such as embedded systems or laptops, are built with layers of preventive security mechanisms to reduce the likelihood of attackers successfully compromising them. Nevertheless, given time and despite decades of improvements in preventive security, intrusions still happen. Therefore, systems should expect intrusions to occur, thus they should be built to detect and to survive them.Commodity Operating Systems (OSs) are deployed with intrusion detection solutions, but their ability to survive them is limited. State-of-the-art approaches from industry or academia either involve manual procedures, loss of availability, coarse-grained responses, or non-negligible performance overhead. Moreover, low-level components, such as the BIOS, are increasingly targeted by sophisticated attackers to implant stealthy and resilient malware. State-of-the-art solutions, however, mainly focus on boot time integrity, leaving the runtime part of the BIOS—known as the System Management Mode (SMM)—a prime target.This dissertation shows that we can build platforms that detect intrusions at the BIOS level and survive intrusions at the OS level. First, by demonstrating that intrusion survivability is a viable approach for commodity OSs. We develop a new approach that address various limitations from the literature, and we evaluate its security and performance. Second, by developing a hardware-based approach that detects attacks at the BIOS level where we demonstrate its feasibility with multiple detection methods
Vigo, John Louis Jr. "Wireless Intrusion Detection Sytem". ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/203.
Testo completoWeigert, Stefan. "Community-Based Intrusion Detection". Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-217677.
Testo completoJacoby, Grant Arthur. "Battery-Based Intrusion Detection". Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/27092.
Testo completoPh. D.
Jacoby, Grant A. "Battery-based intrusion detection /". This resource online, 2005. http://scholar.lib.vt.edu/theses/available/etd-04212005-120840.
Testo completoLibri sul tema "Intrusion"
Intrusion. London: Orbit, 2012.
Cerca il testo completoIntrusion. Paris: Pocket, 2012.
Cerca il testo completoIntrusion. Bloomington, Indiana]: Xlibris, 2014.
Cerca il testo completoAlien intrusion. Green Forest, AR: Master Books, 2004.
Cerca il testo completoSengupta, Nandita, e Jaya Sil. Intrusion Detection. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6.
Testo completoIntrusion detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.
Cerca il testo completoLaw Reform Commission of Canada. Criminal intrusion. Ottawa, Canada: The Commission, 1986.
Cerca il testo completoThe intrusion. [United States]: Innovo Publishing, 2010.
Cerca il testo completoOlgin, Howard. Remote intrusion. New York: Dell Book, 1996.
Cerca il testo completoCriminal intrusion. Ottawa: Law Reform Commission of Canada, 1986.
Cerca il testo completoCapitoli di libri sul tema "Intrusion"
Weik, Martin H. "intrusion". In Computer Science and Communications Dictionary, 833. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9555.
Testo completoSengupta, Nandita, e Jaya Sil. "Introduction". In Intrusion Detection, 1–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_1.
Testo completoSengupta, Nandita, e Jaya Sil. "Discretization". In Intrusion Detection, 27–46. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_2.
Testo completoSengupta, Nandita, e Jaya Sil. "Data Reduction". In Intrusion Detection, 47–82. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_3.
Testo completoSengupta, Nandita, e Jaya Sil. "Q-Learning Classifier". In Intrusion Detection, 83–111. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_4.
Testo completoSengupta, Nandita, e Jaya Sil. "Conclusions and Future Research". In Intrusion Detection, 113–18. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2716-6_5.
Testo completoYi, Myung-Kyu, e Chong-Sun Hwang. "Intrusion-Tolerant Intrusion Detection System". In Intelligence and Security Informatics, 476–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25952-7_38.
Testo completoBace, Rebecca Gurley. "Intrusion Detection and Intrusion Prevention Devices". In Computer Security Handbook, 27.1–27.18. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch27.
Testo completoPerez, André. "Intrusion Detection". In Network Security, 237–51. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch10.
Testo completoHaberlandt, Karl. "Intrusion Errors". In Encyclopedia of Clinical Neuropsychology, 1353–54. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-0-387-79948-3_1131.
Testo completoAtti di convegni sul tema "Intrusion"
Järvinen, V., e T. Halkoaho. "Formation of poikilitic chromite in the basal dunite series of the 2.44 Ga Näränkävaara layered intrusion". In Project KO5125 ARLIN Arctic Layered Intrusions as a Source of Critical Metals for Green Economy European Neighbourhood Instrument Cross-Border Cooperation Programme Kolarctic 2014-2020. GI KSC RAS, 2022. http://dx.doi.org/10.31241/arlin.2022.004.
Testo completoBulegenov, Kanat, Sayat Rais e Daulet Muratkhanov. "GEOLOGY OF PERMIAN GRANITES OF THE KARATAU-NARYN ZONE AND THEIR PROSPECTIVE FOR RARE METALS (SOUTH KAZAKHSTAN)". In 23rd SGEM International Multidisciplinary Scientific GeoConference 2023. STEF92 Technology, 2023. http://dx.doi.org/10.5593/sgem2023/1.1/s01.07.
Testo completoSilva Neto, Manuel Gonçalves da, e Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach". In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Testo completoPrasad, Romesh, e Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System". In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.
Testo completoS. P, Sujini, AnbuShamini G. N e Prija J. S. "Deep Intrusion Detection for DOS and DDOS Attacks Using LSTM and Deep Autoencoder Neural Network". In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qkfn6548/ngcesi23p93.
Testo completoElaeraj, Ouafae, e Cherkaoui Leghris. "The Evolution of Vector Machine Support in the Field of Intrusion Detection Systems". In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111817.
Testo completoLowe, Ryan J. "A Laboratory Study of the Velocity Structure in an Intrusive Gravity Current". In ASME 2000 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/imece2000-2088.
Testo completoCastanhel, Gabriel Ruschel, Tiago Heinrich, Fabrício Ceschin e Carlos A. Maziero. "Sliding Window: The Impact of Trace Size in Anomaly Detection System for Containers Through Machine Learning". In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15203.
Testo completoGuimaraes, Mario, e Meg Murray. "Overview of intrusion detection and intrusion prevention". In the 5th annual conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1456625.1456638.
Testo completoAnand, Vijay. "Intrusion Detection". In the 2014 ACM SIGUCCS Annual Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2661172.2661186.
Testo completoRapporti di organizzazioni sul tema "Intrusion"
Pilny, Julia. Investigating Network Intrusion. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2003. http://dx.doi.org/10.21236/ada412544.
Testo completoTomko, Albert A., Christian J. Rieser, Louis H. Buell, David R. Zaret e William M. Turner. Wireless Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, marzo 2007. http://dx.doi.org/10.21236/ada466332.
Testo completoBace, Rebecca, e Peter Mell. Intrusion detection systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-31.
Testo completoSchnackenberg, Dan, Harley Holliday, Travis Reid, Kelly Bunn e Dan Sterne. Automatic Response to Intrusion. Fort Belvoir, VA: Defense Technical Information Center, ottobre 2002. http://dx.doi.org/10.21236/ada408394.
Testo completoGiffin, Jonathan T., David Dagon, Somesh Jha, Wenke Lee e Barton P. Miller. Environment-Sensitive Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2006. http://dx.doi.org/10.21236/ada448428.
Testo completoRodriguez, J. R., J. C. Matter e B. Dry. Interior intrusion detection systems. Office of Scientific and Technical Information (OSTI), ottobre 1991. http://dx.doi.org/10.2172/5977693.
Testo completoCowles, Robert D. Intrusion Detection and Physics. Office of Scientific and Technical Information (OSTI), febbraio 1999. http://dx.doi.org/10.2172/10009.
Testo completoFirth, Robert, Gary Ford, Barbara Fraser, John Kochmar e Suresh Konda. Detecting Signs of Intrusion. Fort Belvoir, VA: Defense Technical Information Center, agosto 1997. http://dx.doi.org/10.21236/ada329629.
Testo completoWu, Thomas, Michael Malkin e Dan Boneh. Building Intrusion Tolerant Applications. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2001. http://dx.doi.org/10.21236/ada387165.
Testo completoHinkebein, T. E., S. J. Bauer, B. L. Ehgartner, J. K. Linn, J. T. Neal, J. L. Todd, P. S. Kuhlman, C. T. Gniady e H. N. Giles. Gas intrusion into SPR caverns. Office of Scientific and Technical Information (OSTI), dicembre 1995. http://dx.doi.org/10.2172/206492.
Testo completo