Results 41 to 50 of about 700,206 (362)
This research work was set out to map saltwater intrusion in Igbokoda area of Ilaje, Ondo State, Southwestern, Nigeria using combined geophysical and chemical techniques.
JAMES ADEGOKE+2 more
doaj +3 more sources
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day+2 more
core +2 more sources
The effect of intrusive orthodontic force on dental pulp of adults versus adolescents
Background: There is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. The aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults ...
Mostafa Abtahi+3 more
doaj +1 more source
Interdisciplinary approach for pathologic tooth migration in advanced periodontal disease patient
Background: Recent treatment trends have included an interdisciplinary approach to cases and have stressed the importance of orthodontic treatment in optimising the prognosis for patients with periodontal disease.
Marie Louisa
doaj +1 more source
The Social Internet of Things (SIoT) now penetrates our daily lives. As a strategy to alleviate the escalation of resource congestion, collaborative edge computing (CEC) has become a new paradigm for solving the needs of the Internet of Things (IoT). CEC
Laisen Nie+6 more
semanticscholar +1 more source
Geophysical and geochemical data indicate there is abundant fluid expulsion in the Nootka fault zone (NFZ) between the Juan de Fuca and Explorer plates and the Nootka continental slope.
M. Riedel+8 more
doaj +1 more source
Foundation for Intrusion Prevention [PDF]
We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability’s threat with respect to the administrator’s security priorities. The infrastructure foundation is the vulnerability semantics, a small set of attributes for vulnerability definition.
Alderman, Ian D.+3 more
openaire +3 more sources
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez+4 more
core +1 more source
Explainable Artificial Intelligence for Intrusion Detection System
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks.
S. Patil+8 more
semanticscholar +1 more source
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir+2 more
core +2 more sources