Search
نمایش تعداد 1-10 از 433
A Neuro-Fuzzy Classifier for Intrusion Detection Systems
A Neuro-Fuzzy Classifier for Intrusion Detection Systems...
Ontology-based Distributed Intrusion Detection System
In this paper we discussed about utilizing methods and techniques of semantic web in the Intrusion Detection Systems. To extract semantic relations between computer attacks and intrusions in a Distributed Intrusion Detection System, we use ontology...
The Involuntary Excluder Effect: Those Included by an Excluder Are Seen as Exclusive Themselves.
برآورد دز رسیده از یک سیستم مین یاب به روش پس پراکندگی نوترون
landmine-detection systems have been studied widely, but the protection against radiation in these studies has rarely been studied. Systems dosimetry due to the neutron source is important. In this paper, the dose rate received by an operator of a...
Basic controls for generating robots behaviors in HRI contexts
Causal Knowledge Analysis for Detecting and Modeling
In order to understand the security level of an organization network, detection methods are important to tackle the probable risks of the attackers malicious activities. Intrusion Detection Systems (IDSs), as detection solutions of the defense...