Results 341 to 350 of about 700,206 (362)
Some of the next articles are maybe not open access.

Anatomy of an Intrusion

IT Professional, 2010
This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.
openaire   +2 more sources

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

Military Communications and Information Systems Conference, 2015
Nour Moustafa, J. Slay
semanticscholar   +1 more source

An Intrusion-Detection Model

IEEE Symposium on Security and Privacy, 1986
D. Denning
semanticscholar   +1 more source

The Skaergaard Intrusion

1996
Abstract Thanks to its magnificent exposures and extraordinarily complete sequence of strongly differentiated rocks, the Skaergaard Intrusion has long served as a prime example of shallow magmatic differentiation and as a testing ground for a wide range of petrologic concepts. During the magmatic episode accompanying the opening of the North Atlantic
openaire   +2 more sources

Therapeutic Intrusion

Nursing Management (Springhouse), 1991
R, Davidhizar, M, Bowen
openaire   +2 more sources

Cicadic Intrusions

CONTINUUM: Lifelong Learning in Neurology, 2019
openaire   +2 more sources

Noril’sky Intrusive Complex: Zubovsky-Type Intrusions [PDF]

open access: possible, 2014
M. P. Gora, A. Ya. Shevko, V. V. Ryabov
openaire   +1 more source

Home - About - Disclaimer - Privacy