Examinando por Materia "COMPUTADORES - CONTROL DE ACCESO"
Mostrando 1 - 2 de 2
Resultados por página
Opciones de ordenación
Ítem Estudio sobre la seguridad de la información en las organizaciones del área metropolitana de Medellín(Universidad EAFIT, 2006) Casas Jiménez, Liliana; Rincón Bermúdez, Rafael DavidÍtem Nodes selection algorithm for the implementation of an intrusion detection system in a mobile ad hoc network(Universidad EAFIT, 2010) Vélez Granada, Diana Patricia; Lalinde Pulido, Juan GuillermoLiterature about Intrusion Detection Systems (IDS), shows their tasks have been studied enough and are clearly defined to monitor and analyze events, looking for evidence that indicate the presence of intruders[12]. When the purpose is to implement an IDS in a Mobile Ad hoc Network (MANET), the first things that are advertised are the lack of a defense line and physical borders and the limited resources of the devices.