AAFID

Results: 14



#Item
1Technology / Wireless sensor network / Intrusion detection system / Wireless ad-hoc network / Wireless security / Telecommunications engineering / Computing / AAFID / Intrusion detection system evasion techniques / Wireless networking / Computer security / Computer network security

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:15:00
2Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
3Computer security / Intrusion detection system / Petri net / Bro / AAFID / Computer network security / Security / Cyberwarfare

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
4Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
5Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-02-05 20:56:16
6AAFID / System software / Intrusion detection system / Software / Software agent / Mobile agent / Intelligent agent / Agent-based model / Open Source Tripwire / Artificial intelligence / Computer security / Computing

The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2004-02-19 15:54:40
7Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
8Computing / Intrusion detection system / Mobile agent / Software agent / Denial-of-service attack / AAFID / Intrusion detection system evasion techniques / Computer network security / Computer security / Cyberwarfare

INTRUSION DETECTION WITH MOBILE AGENTS Wayne A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 (+[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
9Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:38:16
10Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE