101![Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger](https://www.pdfsearch.io/img/59a1be7496409d78438867cc8c9b016b.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2008-05-30 11:46:33
|
---|
102![A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2 A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2](https://www.pdfsearch.io/img/dd7a26b2b32377428c421f98d4d510e5.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2008-05-27 17:31:10
|
---|
103![Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract](https://www.pdfsearch.io/img/bb939e36c84b3e965e9bdfcfa73d021b.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2008-07-14 15:42:26
|
---|
104![Community Epidemic Detection using Time-Correlated Anomalies Adam J. Oliner, Ashutosh V. Kulkarni, and Alex Aiken Stanford University� {oliner, ashutosh.kulkarni, aiken}@cs.stanford.edu Community Epidemic Detection using Time-Correlated Anomalies Adam J. Oliner, Ashutosh V. Kulkarni, and Alex Aiken Stanford University� {oliner, ashutosh.kulkarni, aiken}@cs.stanford.edu](https://www.pdfsearch.io/img/258d9f2e8a6d170771aaf0cde3a0e00d.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2010-09-07 15:35:08
|
---|
105![8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone 8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone](https://www.pdfsearch.io/img/5e0cb4e43fd4278481a57a858fcdbe41.jpg) | Add to Reading ListSource URL: dcid.meLanguage: English - Date: 2005-02-28 16:38:34
|
---|
106![Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U](https://www.pdfsearch.io/img/3c03a82ed5612adde97daba7a412f812.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2008-06-14 01:31:02
|
---|
107![NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems](https://www.pdfsearch.io/img/1a7c2d5bedb1842cc3d2173e1a20ec42.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-11-09 09:31:11
|
---|
108![Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and](https://www.pdfsearch.io/img/af613133c0dc9a59e9f8ec8f27d7bcce.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2003-05-06 03:43:28
|
---|
109![Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory](https://www.pdfsearch.io/img/1386b3fb5be007f9441a8ed37e37c63e.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2010-03-05 21:14:30
|
---|
110![Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore](https://www.pdfsearch.io/img/4d38ddc397692cb713bf27d6dde76c1f.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2014-12-16 19:06:36
|
---|