<--- Back to Details
First PageDocument Content
Computer security / Intrusion detection system / Snort / Thresh / Alert correlation / Network intrusion detection system / Denial-of-service attack / Evasion / ACARM-ng / Computer network security / System software / Software
Date: 2011-09-28 10:25:46
Computer security
Intrusion detection system
Snort
Thresh
Alert correlation
Network intrusion detection system
Denial-of-service attack
Evasion
ACARM-ng
Computer network security
System software
Software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.secureworks.com

Download Document from Source Website

File Size: 852,81 KB

Share Document on Facebook

Similar Documents

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher  Philip D. Anderson∗ Vern Paxson†

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher Philip D. Anderson∗ Vern Paxson†

DocID: 1xVDw - View Document

Towards	
  illumina.ng	
  a	
  Censorship	
   Monitor’s	
  Model	
  to	
  Facilitate	
   Evasion	
   Sheharbano	
  Kha>ak*,	
  Mobin	
  Javed,	
  Philip	
  D.	
  Anderson*	
  and	
  	
   Vern	
  P

Towards  illumina.ng  a  Censorship   Monitor’s  Model  to  Facilitate   Evasion   Sheharbano  Kha>ak*,  Mobin  Javed,  Philip  D.  Anderson*  and     Vern  P

DocID: 1xTm1 - View Document

PDF Document

DocID: 1xbjX - View Document

Advanced Evasion Techniques by Win32/Gapz Aleksandr Matrosov Eugene Rodionov  Outline of The Presentation

Advanced Evasion Techniques by Win32/Gapz Aleksandr Matrosov Eugene Rodionov Outline of The Presentation

DocID: 1v83P - View Document

RHMD: Evasion-Resilient Hardware Malware Detectors

RHMD: Evasion-Resilient Hardware Malware Detectors

DocID: 1uWOZ - View Document