AAFID

Results: 14



#Item
11Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
12MIM-23 Hawk / Wireless networking / Data security / Technology / Prevention / AAFID / Wireless sensor network / Motion detection / Security / Intrusion detection systems

IBDSS Ultimate Surveillance Integration Integrated Base Defense (IBDSS) combines detection and assessment capabilities to provide a real time, complete operational picture for the

Add to Reading List

Source URL: forcepro.ara.com

Language: English - Date: 2014-10-22 15:54:24
13Software / Computer security / Data security / Intrusion detection system / System administration / AAFID / Anomaly detection / Snort / Misuse detection / Computer network security / Computing / System software

A Distributed Intrusion Detection Prototype using Security Agents V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management & Optimal Design Lab (NETMODE), ECE Department – National Technical

Add to Reading List

Source URL: www.netmode.ntua.gr

Language: English - Date: 2004-05-28 14:14:29
14Cyberwarfare / Intrusion detection system / CERIAS / Computing / Spafford / Vulnerability / Computer security / Gene Spafford / AAFID

PDF Document

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2003-11-26 16:12:51
UPDATE