Artykuły w czasopismach na temat „Intrusion”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Intrusion”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sappin, A. A., M. G. Houlé, D. Corrigan, M. P. Bédard, N. Rayner, N. Wodicka i C. Brind’Amour-Côté. "Petrography, chemical composition, and age constraints of mafic intrusions from the Mesoproterozoic Soisson Intrusive Suite in the southeastern Churchill Province (Canada)". Canadian Journal of Earth Sciences 59, nr 3 (marzec 2022): 180–204. http://dx.doi.org/10.1139/cjes-2021-0059.
Pełny tekst źródłaSpenceley, Anna, i Bill Jerrom. "Intrusive Traumatic Childhood Memories in Depression: A Comparison Between Depressed, Recovered and Never Depressed Women". Behavioural and Cognitive Psychotherapy 25, nr 4 (październik 1997): 309–18. http://dx.doi.org/10.1017/s1352465800018713.
Pełny tekst źródłaWilson, Penelope I. R., Ken J. W. McCaffrey i Robert E. Holdsworth. "Magma-driven accommodation structures formed during sill emplacement at shallow crustal depths: The Maiden Creek sill, Henry Mountains, Utah". Geosphere 15, nr 4 (24.06.2019): 1368–92. http://dx.doi.org/10.1130/ges02067.1.
Pełny tekst źródłaRombold, F., K. Wingenfeld, B. Renneberg, J. Hellmann-Regen, C. Otte i S. Roepke. "Influence of the noradrenergic system on the formation of intrusive memories in women: an experimental approach with a trauma film paradigm". Psychological Medicine 46, nr 12 (23.06.2016): 2523–34. http://dx.doi.org/10.1017/s0033291716001379.
Pełny tekst źródłaROBINS, BRIAN. "The mode of emplacement of the Honningsvåg Intrusive Suite, Magerøya, northern Norway". Geological Magazine 135, nr 2 (marzec 1998): 231–44. http://dx.doi.org/10.1017/s0016756898008395.
Pełny tekst źródłaHUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN i ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland". Geological Magazine 150, nr 5 (22.02.2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.
Pełny tekst źródłaCanhimbue, Ludmila, i Irina Talovina. "Geochemical Distribution of Platinum Metals, Gold and Silver in Intrusive Rocks of the Norilsk Region". Minerals 13, nr 6 (24.05.2023): 719. http://dx.doi.org/10.3390/min13060719.
Pełny tekst źródłaHorsman, Eric, Sven Morgan, Michel de Saint-Blanquat, Guillaume Habert, Andrew Nugent, Robert A. Hunter i Basil Tikoff. "Emplacement and assembly of shallow intrusions from multiple magma pulses, Henry Mountains, Utah". Earth and Environmental Science Transactions of the Royal Society of Edinburgh 100, nr 1-2 (marzec 2009): 117–32. http://dx.doi.org/10.1017/s1755691009016089.
Pełny tekst źródłaPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection". International Journal for Research in Applied Science and Engineering Technology 11, nr 10 (31.10.2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Pełny tekst źródłaSolomon, Irin Anna, Aman Jatain i Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning". Asian Journal of Computer Science and Technology 8, nr 2 (5.05.2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Pełny tekst źródłaLiu, Gui Guo. "Intrusion Detection Systems". Applied Mechanics and Materials 596 (lipiec 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Pełny tekst źródłaAmirah i Ahmad Sanmorino. "Deteksi Intrusi Siber pada Sistem Pembelajaran Elektronik berbasis Machine Learning". Jurnal Ilmiah Informatika Global 14, nr 2 (3.08.2023): 12–16. http://dx.doi.org/10.36982/jiig.v14i2.3227.
Pełny tekst źródłaBoyd, R., i W. A. Ashcroft. "Significance of the cumulate mineralogy of the Belhelvie mafic-ultramafic intrusion—comments on: Silicate mineralogy of the Belhelvie cumulates, NE Scotland, by W. J. Wadsworth". Mineralogical Magazine 56, nr 384 (wrzesień 1992): 329–33. http://dx.doi.org/10.1180/minmag.1992.056.384.04.
Pełny tekst źródłaMcKenzie, Thomas Levy. "The New Intrusion Tort: The News Media Exposed?" Victoria University of Wellington Law Review 45, nr 1 (1.08.2014): 79. http://dx.doi.org/10.26686/vuwlr.v45i1.4968.
Pełny tekst źródłaTHÓRARINSSON, SIGURJÓN B., PAUL M. HOLM, SEBASTIAN TAPPE, LARRY M. HEAMAN i NIELS-OLE PRÆGEL. "U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland: constraints on the Iceland hotspot track during the rift-to-drift transition". Geological Magazine 153, nr 1 (3.07.2015): 128–42. http://dx.doi.org/10.1017/s0016756815000448.
Pełny tekst źródłaBryden, James E., Laurel B. Andrew i Jan S. Fortuniewicz. "Intrusion Accidents on Highway Construction Projects". Transportation Research Record: Journal of the Transportation Research Board 1715, nr 1 (styczeń 2000): 30–35. http://dx.doi.org/10.3141/1715-05.
Pełny tekst źródłaWilson, Penelope I. R., Robert W. Wilson, David J. Sanderson, Ian Jarvis i Kenneth J. W. McCaffrey. "Analysis of deformation bands associated with the Trachyte Mesa intrusion, Henry Mountains, Utah: implications for reservoir connectivity and fluid flow around sill intrusions". Solid Earth 12, nr 1 (20.01.2021): 95–117. http://dx.doi.org/10.5194/se-12-95-2021.
Pełny tekst źródłaJatti, Ashwini V., i V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, nr 6 (3.06.2019): 60–79. http://dx.doi.org/10.26643/rb.v118i6.7239.
Pełny tekst źródłaJatti, Ashwini V., i V. J. K. Kishor Sonti. "Intrusion Detection Systems: A Review". Restaurant Business 118, nr 7 (28.07.2019): 50–58. http://dx.doi.org/10.26643/rb.v118i7.7246.
Pełny tekst źródłaLi, You Guo. "Analysis of the Snort Building Code Based on IDS". Applied Mechanics and Materials 543-547 (marzec 2014): 2965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2965.
Pełny tekst źródłaSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov i Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks". Программные системы и вычислительные методы, nr 3 (marzec 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Pełny tekst źródłaEl Namrawy, Manal Mohamed, Fouad El Sharaby i Mohamed Bushnak. "Intrusive Arch versus Miniscrew-Supported Intrusion for Deep Bite Correction". Open Access Macedonian Journal of Medical Sciences 7, nr 11 (16.06.2019): 1841–46. http://dx.doi.org/10.3889/oamjms.2019.332.
Pełny tekst źródłaSkyttä, P., T. Hermansson, J. Andersson i P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth Discussions 3, nr 1 (1.04.2011): 355–83. http://dx.doi.org/10.5194/sed-3-355-2011.
Pełny tekst źródłaSkyttä, P., T. Hermansson, J. Andersson, M. Whitehouse i P. Weihed. "New zircon data supporting models of short-lived igneous activity at 1.89 Ga in the western Skellefte District, central Fennoscandian Shield". Solid Earth 2, nr 2 (26.10.2011): 205–17. http://dx.doi.org/10.5194/se-2-205-2011.
Pełny tekst źródłaAli, Rashid, i Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems". Advanced Materials Research 403-408 (listopad 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Pełny tekst źródłaShihadeh, Layaly, i Monica Rosselli. "46 Intrusions in Verbal Fluency Tasks in Mild Cognitive Impairment and Dementia: A Longitudinal Analysis". Journal of the International Neuropsychological Society 29, s1 (listopad 2023): 919. http://dx.doi.org/10.1017/s1355617723011281.
Pełny tekst źródłaChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang i Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals". Social Behavior and Personality: an international journal 38, nr 10 (1.11.2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Pełny tekst źródłaColpron, Maurice, Raymond A. Price i Douglas A. Archibald. "40Ar/39Ar thermochronometric constraints on the tectonic evolution of the Clachnacudainn complex, southeastern British Columbia". Canadian Journal of Earth Sciences 36, nr 12 (1.12.1999): 1989–2006. http://dx.doi.org/10.1139/e99-100.
Pełny tekst źródłaGraves, Lisa V., Heather M. Holden, Emily J. Van Etten, Lisa Delano-Wood, Mark W. Bondi, David P. Salmon, Jody Corey-Bloom, Paul E. Gilbert i Dean C. Delis. "New Intrusion Analyses on the CVLT-3: Utility in Distinguishing the Memory Disorders of Alzheimer’s versus Huntington’s Disease". Journal of the International Neuropsychological Society 25, nr 08 (7.05.2019): 878–83. http://dx.doi.org/10.1017/s1355617719000407.
Pełny tekst źródłaSaleeby, Jason B. "Age and tectonic setting of the Duke Island ultramafic intrusion, southeast Alaska". Canadian Journal of Earth Sciences 29, nr 3 (1.03.1992): 506–22. http://dx.doi.org/10.1139/e92-044.
Pełny tekst źródłaSingh, Neha, Deepali Virmani i Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset". International Journal of Computational Intelligence and Applications 19, nr 03 (19.08.2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Pełny tekst źródłaKamble, Arvind, i Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems". International Journal of Swarm Intelligence Research 13, nr 3 (1.07.2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Pełny tekst źródłaYou, Minxin, Wenyuan Li, Houmin Li, Zhaowei Zhang i Xin Li. "Petrogenesis and Tectonic Significance of the ~276 Ma Baixintan Ni-Cu Ore-Bearing Mafic-Ultramafic Intrusion in the Eastern Tianshan Orogenic Belt, NW China". Minerals 11, nr 4 (26.03.2021): 348. http://dx.doi.org/10.3390/min11040348.
Pełny tekst źródłaJacobus, Agustinus, i Edi Winarko. "Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time". IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, nr 1 (31.01.2014): 13. http://dx.doi.org/10.22146/ijccs.3491.
Pełny tekst źródłaBrunner, Csaba, Andrea Kő i Szabina Fodor. "An Autoencoder-Enhanced Stacking Neural Network Model for Increasing the Performance of Intrusion Detection". Journal of Artificial Intelligence and Soft Computing Research 12, nr 2 (1.04.2021): 149–63. http://dx.doi.org/10.2478/jaiscr-2022-0010.
Pełny tekst źródłaHolm, Paul Martin, Eva Degn Egeberg i Niels-Ole Prægel. "Multiple syenite intrusions at Kærven, Kangerdlugssuaq, East Greenland: Evidence from the 1986 field work." Bulletin of the Geological Society of Denmark 38 (18.02.1991): 173–81. http://dx.doi.org/10.37570/bgsd-1990-38-17.
Pełny tekst źródłaMazhari, Marzieh, Mashallah Khanehmasjedi, Mohsen Mazhary, Nastaran Atashkar i Vahid Rakhshan. "Dynamics, Efficacies, and Adverse Effects of Maxillary Full-Arch Intrusion Using Temporary Anchorage Devices (Miniscrews): A Finite Element Analysis". BioMed Research International 2022 (7.10.2022): 1–25. http://dx.doi.org/10.1155/2022/6706392.
Pełny tekst źródłaMUNROE, J. R., C. VOEGELI, B. R. SUTHERLAND, V. BIRMAN i E. H. MEIBURG. "Intrusive gravity currents from finite-length locks in a uniformly stratified fluid". Journal of Fluid Mechanics 635 (10.09.2009): 245–73. http://dx.doi.org/10.1017/s0022112009007563.
Pełny tekst źródłaAlbers, John R., George N. Kiladis, Thomas Birner i Juliana Dias. "Tropical Upper-Tropospheric Potential Vorticity Intrusions during Sudden Stratospheric Warmings". Journal of the Atmospheric Sciences 73, nr 6 (20.05.2016): 2361–84. http://dx.doi.org/10.1175/jas-d-15-0238.1.
Pełny tekst źródłaŞermet Elbay, Ülkü, Mesut Elbay, Emine Kaya i Alper Sinanoglu. "Management of an Intruded Tooth and Adjacent Tooth Showing External Resorption as a Late Complication of Dental Injury: Three-Year Follow-Up". Case Reports in Dentistry 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/741687.
Pełny tekst źródłaHaslett, Simon K. "Magnetic survey of a monchiquite intrusion in central Gwent". Geological Magazine 127, nr 6 (listopad 1990): 591–92. http://dx.doi.org/10.1017/s001675680001548x.
Pełny tekst źródłaGan, Weibing, Sheng Li, Zhengying Li i Lizhi Sun. "Identification of Ground Intrusion in Underground Structures Based on Distributed Structural Vibration Detected by Ultra-Weak FBG Sensing Technology". Sensors 19, nr 9 (9.05.2019): 2160. http://dx.doi.org/10.3390/s19092160.
Pełny tekst źródłaLin, Qingyuan, Rui Ming, Kailing Zhang i Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach". Security and Communication Networks 2022 (10.10.2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Pełny tekst źródłaH R, Bhargav. "Comparison of Machine Learning and Deep Learning algorithms for Detecting Intrusions in Network". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 1863–70. http://dx.doi.org/10.22214/ijraset.2022.45588.
Pełny tekst źródłaO'Driscoll, B. "The Centre 3 layered gabbro intrusion, Ardnamurchan, NW Scotland". Geological Magazine 144, nr 6 (21.09.2007): 897–908. http://dx.doi.org/10.1017/s0016756807003846.
Pełny tekst źródłaZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing". Wireless Communications and Mobile Computing 2022 (9.06.2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Pełny tekst źródłaDE ROOIJ, FRANS, P. F. LINDEN i STUART B. DALZIEL. "Saline and particle-driven interfacial intrusions". Journal of Fluid Mechanics 389 (25.06.1999): 303–34. http://dx.doi.org/10.1017/s0022112099005078.
Pełny tekst źródłaReshmi, B. M., S. S. Manvi i Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks". Mobile Information Systems 2, nr 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Pełny tekst źródłaYu, Jie, Guo Xiang Yao i Wei Wei Zhang. "Intrusion Detection Method Based on Frequent Pattern". Advanced Materials Research 204-210 (luty 2011): 1751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1751.
Pełny tekst źródłaFletcher, Keaton A., i Wendy L. Bedwell. "An Initial Look at the Effects of Interruptions On Strain". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, nr 1 (wrzesień 2016): 1269–73. http://dx.doi.org/10.1177/1541931213601295.
Pełny tekst źródła