Results 41 to 50 of about 700,206 (362)

MAPPING OF SALTWATER INTRUSION AT IGBOKODA, SOUTHWESTERN, NIGERIA USING COMBINED GEOPHYSICAL AND CHEMICAL TECHNIQUES

open access: yesJournal of Engineering Studies and Research, 2018
This research work was set out to map saltwater intrusion in Igbokoda area of Ilaje, Ondo State, Southwestern, Nigeria using combined geophysical and chemical techniques.
JAMES ADEGOKE   +2 more
doaj   +3 more sources

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]

open access: yes, 2012
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day   +2 more
core   +2 more sources

The effect of intrusive orthodontic force on dental pulp of adults versus adolescents

open access: yesDental Research Journal, 2016
Background: There is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. The aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults ...
Mostafa Abtahi   +3 more
doaj   +1 more source

Interdisciplinary approach for pathologic tooth migration in advanced periodontal disease patient

open access: yesDental Journal, 2022
Background: Recent treatment trends have included an interdisciplinary approach to cases and have stressed the importance of orthodontic treatment in optimising the prognosis for patients with periodontal disease.
Marie Louisa
doaj   +1 more source

Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach

open access: yesIEEE Transactions on Computational Social Systems, 2022
The Social Internet of Things (SIoT) now penetrates our daily lives. As a strategy to alleviate the escalation of resource congestion, collaborative edge computing (CEC) has become a new paradigm for solving the needs of the Internet of Things (IoT). CEC
Laisen Nie   +6 more
semanticscholar   +1 more source

Focused Fluid Flow Along the Nootka Fault Zone and Continental Slope, Explorer‐Juan de Fuca Plate Boundary

open access: yesGeochemistry, Geophysics, Geosystems, 2020
Geophysical and geochemical data indicate there is abundant fluid expulsion in the Nootka fault zone (NFZ) between the Juan de Fuca and Explorer plates and the Nootka continental slope.
M. Riedel   +8 more
doaj   +1 more source

Foundation for Intrusion Prevention [PDF]

open access: yes, 2004
We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability’s threat with respect to the administrator’s security priorities. The infrastructure foundation is the vulnerability semantics, a small set of attributes for vulnerability definition.
Alderman, Ian D.   +3 more
openaire   +3 more sources

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Explainable Artificial Intelligence for Intrusion Detection System

open access: yesElectronics, 2022
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks.
S. Patil   +8 more
semanticscholar   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy