Articoli di riviste sul tema "Intrusion"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Intrusion".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka e C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)". Canadian Journal of Earth Sciences 59, n. 3 (marzo 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Testo completoSpenceley, Anna, e Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women". Behavioural and Cognitive Psychotherapy 25, n. 4 (ottobre 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Testo completoWilson, Penelope I. R., Ken J. W. McCaffrey e Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah". Geosphere 15, n. 4 (24 giugno 2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Testo completoRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte e S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm". Psychological Medicine 46, n. 12 (23 giugno 2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Testo completoROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway". Geological Magazine 135, n. 2 (marzo 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Testo completoHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN e ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland". Geological Magazine 150, n. 5 (22 febbraio 2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Testo completoCanhimbue, Ludmila, e Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region". Minerals 13, n. 6 (24 maggio 2023): 719. http://dx.doi.org/10.3390/min13060719.
Testo completoHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter e Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah". Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, n. 1-2 (marzo 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Testo completoPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection". International Journal for Research in Applied Science and Engineering Technology 11, n. 10 (31 ottobre 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Testo completoSolomon, Irin Anna, Aman Jatain e Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning". Asian Journal of Computer Science and Technology 8, n. 2 (5 maggio 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Testo completoLiu, Gui Guo. "Intrusion Detection Systems". Applied Mechanics and Materials 596 (luglio 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Testo completoAmirah e Ahmad Sanmorino. "Deteksi Intrusi Siber pada Sistem Pembelajaran Elektronik berbasis Machine Learning". Jurnal Ilmiah Informatika Global 14, n. 2 (3 agosto 2023): 12–16. http://dx.doi.org/10.36982/jiig.v14i2.3227.
Testo completoBoyd, R., e W. A. Ashcroft. "Significance of the cumulate mineralogy of the Belhelvie mafic-ultramafic intrusion—comments on: Silicate mineralogy of the Belhelvie cumulates, NE Scotland, by W. J. Wadsworth". Mineralogical Magazine 56, n. 384 (settembre 1992): 329–33. http://dx.doi.org/10.1180/minmag.1992.056.384.04.
Testo completoMcKenzie, Thomas Levy. "The New Intrusion Tort: The News Media Exposed?" Victoria University of Wellington Law Review 45, n. 1 (1 agosto 2014): 79. http://dx.doi.org/10.26686/vuwlr.v45i1.4968.
Testo completoTHÓRARINSSON, SIGURJÓN B., PAUL M. HOLM, SEBASTIAN TAPPE, LARRY M. HEAMAN e NIELS-OLE PRÆGEL. "U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland: constraints on the Iceland hotspot track during the rift-to-drift transition". Geological Magazine 153, n. 1 (3 luglio 2015): 128–42. http://dx.doi.org/10.1017/s0016756815000448.
Testo completoBryden, James E., Laurel B. Andrew e Jan S. Fortuniewicz. "Intrusion Accidents on Highway Construction Projects". Transportation Research Record: Journal of the Transportation Research Board 1715, n. 1 (gennaio 2000): 30–35. http://dx.doi.org/10.3141/1715-05.
Testo completoWilson, Penelope I. R., Robert W. Wilson, David J. Sanderson, Ian Jarvis e Kenneth J. W. McCaffrey. "Analysis of deformation bands associated with the Trachyte Mesa intrusion, Henry Mountains, Utah: implications for reservoir connectivity and fluid flow around sill intrusions". Solid Earth 12, n. 1 (20 gennaio 2021): 95–117. http://dx.doi.org/10.5194/se-12-95-2021.
Testo completoJatti, Ashwini V., e V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, n. 6 (3 giugno 2019): 60–79. http://dx.doi.org/10.26643/rb.v118i6.7239.
Testo completoJatti, Ashwini V., e V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, n. 7 (28 luglio 2019): 50–58. http://dx.doi.org/10.26643/rb.v118i7.7246.
Testo completoLi, You Guo. "Analysis of the Snort Building Code Based on IDS". Applied Mechanics and Materials 543-547 (marzo 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Testo completoSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov e Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks". Программные системы и вычислительные методы, n. 3 (marzo 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Testo completoEl Namrawy, Manal Mohamed, Fouad El Sharaby e Mohamed Bushnak. "Intrusive Arch versus Miniscrew-Supported Intrusion for Deep Bite Correction". Open Access Macedonian Journal of Medical Sciences 7, n. 11 (16 giugno 2019): 1841–46. http://dx.doi.org/10.3889/oamjms.2019.332.
Testo completoSkyttä, P., T. Hermansson, J. Andersson e P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth Discussions 3, n. 1 (1 aprile 2011): 355–83. http://dx.doi.org/10.5194/sed-3-355-2011.
Testo completoSkyttä, P., T. Hermansson, J. Andersson, M. Whitehouse e P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth 2, n. 2 (26 ottobre 2011): 205–17. http://dx.doi.org/10.5194/se-2-205-2011.
Testo completoAli, Rashid, e Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems". Advanced Materials Research 403-408 (novembre 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Testo completoShihadeh, Layaly, e Monica Rosselli. "46 Intrusions in Verbal Fluency Tasks in Mild Cognitive Impairment and Dementia: A Longitudinal Analysis". Journal of the International Neuropsychological Society 29, s1 (novembre 2023): 919. http://dx.doi.org/10.1017/s1355617723011281.
Testo completoChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang e Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals". Social Behavior and Personality: an international journal 38, n. 10 (1 novembre 2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Testo completoColpron, Maurice, Raymond A. Price e Douglas A. Archibald. "40Ar/39Ar thermochronometric constraints on the tectonic evolution of the Clachnacudainn complex, southeastern British Columbia". Canadian Journal of Earth Sciences 36, n. 12 (1 dicembre 1999): 1989–2006. http://dx.doi.org/10.1139/e99-100.
Testo completoGraves, Lisa V., Heather M. Holden, Emily J. Van Etten, Lisa Delano-Wood, Mark W. Bondi, David P. Salmon, Jody Corey-Bloom, Paul E. Gilbert e Dean C. Delis. "New Intrusion Analyses on the CVLT-3: Utility in Distinguishing the Memory Disorders of Alzheimer’s versus Huntington’s Disease". Journal of the International Neuropsychological Society 25, n. 08 (7 maggio 2019): 878–83. http://dx.doi.org/10.1017/s1355617719000407.
Testo completoSaleeby, Jason B. "Age and tectonic setting of the Duke Island ultramafic intrusion, southeast Alaska". Canadian Journal of Earth Sciences 29, n. 3 (1 marzo 1992): 506–22. http://dx.doi.org/10.1139/e92-044.
Testo completoSingh, Neha, Deepali Virmani e Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset". International Journal of Computational Intelligence and Applications 19, n. 03 (19 agosto 2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Testo completoKamble, Arvind, e Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems". International Journal of Swarm Intelligence Research 13, n. 3 (1 luglio 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Testo completoYou, Minxin, Wenyuan Li, Houmin Li, Zhaowei Zhang e Xin Li. "Petrogenesis and Tectonic Significance of the ~276 Ma Baixintan Ni-Cu Ore-Bearing Mafic-Ultramafic Intrusion in the Eastern Tianshan Orogenic Belt, NW China". Minerals 11, n. 4 (26 marzo 2021): 348. http://dx.doi.org/10.3390/min11040348.
Testo completoJacobus, Agustinus, e Edi Winarko. "Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time". IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, n. 1 (31 gennaio 2014): 13. http://dx.doi.org/10.22146/ijccs.3491.
Testo completoBrunner, Csaba, Andrea Kő e Szabina Fodor. "An Autoencoder-Enhanced Stacking Neural Network Model for Increasing the Performance of Intrusion Detection". Journal of Artificial Intelligence and Soft Computing Research 12, n. 2 (1 aprile 2021): 149–63. http://dx.doi.org/10.2478/jaiscr-2022-0010.
Testo completoHolm, Paul Martin, Eva Degn Egeberg e Niels-Ole Prægel. "Multiple syenite intrusions at Kærven, Kangerdlugssuaq, East Greenland: Evidence from the 1986 field work." Bulletin of the Geological Society of Denmark 38 (18 febbraio 1991): 173–81. http://dx.doi.org/10.37570/bgsd-1990-38-17.
Testo completoMazhari, Marzieh, Mashallah Khanehmasjedi, Mohsen Mazhary, Nastaran Atashkar e Vahid Rakhshan. "Dynamics, Efficacies, and Adverse Effects of Maxillary Full-Arch Intrusion Using Temporary Anchorage Devices (Miniscrews): A Finite Element Analysis". BioMed Research International 2022 (7 ottobre 2022): 1–25. http://dx.doi.org/10.1155/2022/6706392.
Testo completoMUNROE, J. R., C. VOEGELI, B. R. SUTHERLAND, V. BIRMAN e E. H. MEIBURG. "Intrusive gravity currents from finite-length locks in a uniformly stratified fluid". Journal of Fluid Mechanics 635 (10 settembre 2009): 245–73. http://dx.doi.org/10.1017/s0022112009007563.
Testo completoAlbers, John R., George N. Kiladis, Thomas Birner e Juliana Dias. "Tropical Upper-Tropospheric Potential Vorticity Intrusions during Sudden Stratospheric Warmings". Journal of the Atmospheric Sciences 73, n. 6 (20 maggio 2016): 2361–84. http://dx.doi.org/10.1175/jas-d-15-0238.1.
Testo completoŞermet Elbay, Ülkü, Mesut Elbay, Emine Kaya e Alper Sinanoglu. "Management of an Intruded Tooth and Adjacent Tooth Showing External Resorption as a Late Complication of Dental Injury: Three-Year Follow-Up". Case Reports in Dentistry 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/741687.
Testo completoHaslett, Simon K. "Magnetic survey of a monchiquite intrusion in central Gwent". Geological Magazine 127, n. 6 (novembre 1990): 591–92. http://dx.doi.org/10.1017/s001675680001548x.
Testo completoGan, Weibing, Sheng Li, Zhengying Li e Lizhi Sun. "Identification of Ground Intrusion in Underground Structures Based on Distributed Structural Vibration Detected by Ultra-Weak FBG Sensing Technology". Sensors 19, n. 9 (9 maggio 2019): 2160. http://dx.doi.org/10.3390/s19092160.
Testo completoLin, Qingyuan, Rui Ming, Kailing Zhang e Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach". Security and Communication Networks 2022 (10 ottobre 2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Testo completoH R, Bhargav. "Comparison of Machine Learning and Deep Learning algorithms for Detecting Intrusions in Network". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 1863–70. http://dx.doi.org/10.22214/ijraset.2022.45588.
Testo completoO'Driscoll, B. "The Centre 3 layered gabbro intrusion, Ardnamurchan, NW Scotland". Geological Magazine 144, n. 6 (21 settembre 2007): 897–908. http://dx.doi.org/10.1017/s0016756807003846.
Testo completoZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing". Wireless Communications and Mobile Computing 2022 (9 giugno 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Testo completoDE ROOIJ, FRANS, P. F. LINDEN e STUART B. DALZIEL. "Saline and particle-driven interfacial intrusions". Journal of Fluid Mechanics 389 (25 giugno 1999): 303–34. http://dx.doi.org/10.1017/s0022112099005078.
Testo completoReshmi, B. M., S. S. Manvi e Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks". Mobile Information Systems 2, n. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Testo completoYu, Jie, Guo Xiang Yao e Wei Wei Zhang. "Intrusion Detection Method Based on Frequent Pattern". Advanced Materials Research 204-210 (febbraio 2011): 1751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1751.
Testo completoFletcher, Keaton A., e Wendy L. Bedwell. "An Initial Look at the Effects of Interruptions On Strain". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n. 1 (settembre 2016): 1269–73. http://dx.doi.org/10.1177/1541931213601295.
Testo completo