Intrusion detection system

Results: 338



#Item
1

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Add to Reading List

Source URL: ieee-ssci2018.org

Language: English - Date: 2018-04-07 06:55:01
    2

    ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    Add to Reading List

    Source URL: www.alertlogic.com

    Language: English - Date: 2018-08-16 13:48:55
      3

      Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

      Add to Reading List

      Source URL: homeostasis.scs.carleton.ca

      - Date: 2007-01-02 10:18:15
        4

        Intrusion Detection System Installation Installation (Already completed) apt-get update && apt-get install libpcre3 libpcre3-dbg build-essential autoconf automake

        Add to Reading List

        Source URL: jpyorre.com

        - Date: 2016-10-15 17:51:19
          5

          Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

          Add to Reading List

          Source URL: netcom.army.mil

          - Date: 2009-10-26 18:26:12
            6

            Experimental Evaluation of Qualitative Probability applied to Sensor Fusion and Intrusion Detection/Diagnosis Robert P. Goldman and John Maraist Abstract We experimentally analyze the accuracy of the System Z+

            Add to Reading List

            Source URL: qr15.sift.net

            - Date: 2015-08-11 09:14:44
              7

              This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

              Add to Reading List

              Source URL: www.cs.unm.edu

              - Date: 2010-04-09 00:32:36
                8Computing / Computer network security / Cloud clients / Information appliances / Cybercrime / Mobile phones / Computer security / Intrusion detection system / Android / Mobile device / Malware / Smartphone

                Microsoft Word - Call_CRC_gk

                Add to Reading List

                Source URL: www.icsd.aegean.gr

                Language: English - Date: 2016-01-26 04:44:13
                9Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

                CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

                Add to Reading List

                Source URL: jon.oberheide.org

                Language: English - Date: 2015-10-11 18:23:54
                10Computer security / Computer network security / Security / Cyberwarfare / Computer network operations / Campaign for Nuclear Disarmament / Threat / Intrusion detection system

                Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

                Add to Reading List

                Source URL: www.tsc.com

                Language: English - Date: 2015-08-27 14:40:43
                UPDATE