Results 21 to 30 of about 545,206 (314)

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +3 more sources

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +3 more sources

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

ANTHROPOPHILOUS REPRESENTATIVES OF BRASSICACEAE BURNETT OF THE NORTHERN TURAN (CONSPECTUS OF SPECIES)

open access: yesТруды по прикладной ботанике, генетике и селекции, 2018
In the Northern Turan's flora by the present moment 134 species of Brassicaceae Burnett family were noted. It was revealed that 96 (71.6%) species among them had the anthropophilous nature of distribution.
P. V. Vesselova
doaj   +1 more source

Sources and sinks of bottom water oxygen in a seasonally hypoxic fjord

open access: yesFrontiers in Marine Science, 2023
Deoxygenation of the ocean has been occurring over the last half century, particularly in poorly ventilated coastal waters. In coastal and estuarine environments, both the water column and sediments play key roles in controlling oxygen variability.
Subhadeep Rakshit   +3 more
doaj   +1 more source

Intrusion and extrusion of water in hydrophobic nanopores [PDF]

open access: yes, 2017
Heterogeneous systems composed of hydrophobic nanoporous materials and water are capable, depending on their characteristics, of efficiently dissipating (dampers) or storing ("molecular springs") energy.
Casciola, Carlo Massimo   +3 more
core   +1 more source

Modeling Ice Melt Rates From Seawater Intrusions in the Grounding Zone of Petermann Gletscher, Greenland

open access: yesGeophysical Research Letters, 2023
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Similarity Based Feature Transformation for Network Anomaly Detection

open access: yesIEEE Access, 2020
The fundamental objective behind any network intrusion detection system is to automate the detection process whenever intrusions occur in the network.
Arun Nagaraja   +5 more
doaj   +1 more source

Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea

open access: yesFrontiers in Marine Science, 2020
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui   +12 more
doaj   +1 more source

Home - About - Disclaimer - Privacy