Results 291 to 300 of about 555,600 (315)
Some of the next articles are maybe not open access.

A survey of VoIP intrusions and intrusion detection systems

The 6th International Conference on Advanced Communication Technology, 2004., 2004
This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire   +2 more sources

Organizational Change in Intrusive and Non-intrusive Environments

Journal of Organisational Transformation & Social Change, 2016
This article discusses the importance of environments for managers’ successful introduction of a new management technique. Two empirical examples illustrate the interrelatedness of external and internal environments and its consequences for the propensity of organizations to accept and implement managerial propositions.
openaire   +2 more sources

Intrusive Gravity Currents

Studies in Applied Mathematics, 1997
Intrusive gravity currents arise when a fluid of intermediate density intrudes into an ambient fluid. These intrusions may occur in both natural and human‐made settings and may be the result of a sudden release of a fixed volume of fluid or the steady or time‐dependent injection of such a fluid.
T. B. Moodie   +3 more
openaire   +3 more sources

Intrusion and Hacking

Journal of Information Privacy and Security, 2007
(2007). Intrusion and Hacking. Journal of Information Privacy and Security: Vol. 3, No. 4, pp. 1-2.
openaire   +2 more sources

The Politics of Intrusion

CR: The New Centennial Review, 2002
the foreigner foreign is her foreign-ness; what makes the newborn new and promising is her newness. Once the stranger becomes familiar, once the foreigner is naturalized, once the newborn is socialized or educated into the ways of the world, the threat posed by strangeness/foreignness/newness is dissipated, and with that comes a loss. Without strangers
openaire   +2 more sources

Anatomy of an Intrusion

IT Professional, 2010
This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.
openaire   +2 more sources

Nystagmus and saccadic intrusions

2011
We review current concepts of nystagmus and saccadic oscillations, applying a pathophysiological approach. We begin by discussing how nystagmus may arise when the mechanisms that normally hold gaze steady are impaired. We then describe the clinical and laboratory evaluation of patients with ocular oscillations.
R. John Leigh, Matthew J. Thurtell
openaire   +3 more sources

The Skaergaard Intrusion

1996
Abstract Thanks to its magnificent exposures and extraordinarily complete sequence of strongly differentiated rocks, the Skaergaard Intrusion has long served as a prime example of shallow magmatic differentiation and as a testing ground for a wide range of petrologic concepts. During the magmatic episode accompanying the opening of the North Atlantic
openaire   +2 more sources

Therapeutic Intrusion

Nursing Management (Springhouse), 1991
R, Davidhizar, M, Bowen
openaire   +2 more sources

Home - About - Disclaimer - Privacy