Intrusion detection system

Results: 338



#Item
91Civil law / Digital signature / Programming language theory / Cyberwarfare / Gamper / Intrusion detection system / Pascal

Celeste - Distributed Secure Storage

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:53:07
92Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Language: English - Date: 2004-02-27 15:21:35
93Software / Computing / Intrusion detection system / Honeyd / Geographic information system / Snort / Client honeypot / Computer network security / Honeypot / Cyberwarfare

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2005-12-14 05:05:52
94Computing / Intrusion prevention system / Intrusion detection system / Check Point / Burglar alarm / TippingPoint / Bypass switch / Computer network security / Security / Computer security

PDF Document

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2009-09-18 10:10:34
95Computational statistics / Learning / Anomaly detection / Data mining / Data security / Intrusion detection system / Concept learning / Boosting / Supervised learning / Machine learning / Statistics / Learning theory

To appear in Proceedings of the ACM Symposium on Information, Computer, and Communication Security, March 2006 Can Machine Learning Be Secure? Marco Barreno

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-02-11 16:41:05
96Information / Mutual information / Anomaly detection / Intrusion detection system / Function / Statistics / Information theory / Mathematics

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
97Mathematics / Information theory / Statistical classification / Mutual information / Intrusion detection system / Differential form / Receiver operating characteristic / Norm / Filter / Statistics / Topology / General topology

Measuring Intrusion Detection Capability: ∗ An Information-Theoretic Approach ˇ Boris Skori´ c

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
98Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
99System software / Berkeley Packet Filter / Firewall / Packet capture / Netfilter / Packet switching / Filter / Transmission Control Protocol / Packet Processing / Computing / Computer network security / Network architecture

Enhancing Network Intrusion Detection With Integrated Sampling and Filtering Jose M. Gonzalez and Vern Paxson International Computer Science Institute Berkeley, California, USA , / ve

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:15:00
UPDATE