Back to Results
First PageMeta Content
Computer security / Intrusion detection system / Snort / Thresh / Alert correlation / Network intrusion detection system / Denial-of-service attack / Evasion / ACARM-ng / Computer network security / System software / Software


Paper Title (use style: paper title)
Add to Reading List

Document Date: 2011-09-28 10:25:46


Open Document

File Size: 852,81 KB

Share Result on Facebook

City

Atlanta / /

Company

Mobile Ad Hoc Networks / Network Intrusion Detection Systems / John Wiley and Sons / Testing Intrusion Detection Systems / Improving Intrusion Detection Effectiveness Ashley Thomas SecureWorks Inc / /

Country

France / United States / /

/

Event

Business Partnership / /

Facility

Victim‟s port / /

IndustryTerm

daily internet traffic data / WEB-MISC /doc/ access / ad hoc networks / evasion tools / distributed and trusted devices / intrusion detection systems / sandbox server / corporate network / realistic networks / individual devices / /

MarketIndex

set 243570 / /

Organization

US Federal Reserve / /

Person

Stefan Axelsson / David J / Bruno Crispo / Richard Lippmann / Josh Haines / Joshua W. Haines / David Dagon / Aditya Akella / Peter Mell / Martin Roesch / Jonathan Korba / Vincent Hu / Kumar Das / Marc Zissman / Sandro Etalle / Sophia Antipolis / Holly Esquivel / Tatsuya Mori / Almir Mutapcic / /

Position

security analyst / administrator / security officer / Private / /

Product

Snort / /

ProgrammingLanguage

FP / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

SNMP / firewall / peer to peer / Network Address Translation / UDP / RAID / pdf / /

URL

http /

SocialTag