Intrusion detection system

Results: 338



#Item
111A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
112Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
113Chapter 2  Installation Solutions in this chapter: ■

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
114Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Add to Reading List

Source URL: rpgoldman.goldman-tribe.org

Language: English - Date: 2009-08-06 12:04:58
115Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford  ∗

Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford ∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:19
116White Paper  The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-20 18:39:36
117Systems Security Research at POLIMI Federico Maggi Stefano Zanero 2

Systems Security Research at POLIMI Federico Maggi Stefano Zanero 2

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:22:30
118COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

Add to Reading List

Source URL: www.countersnipe.com

Language: English - Date: 2014-11-25 12:45:19
119Security and Dependability @ VU

Security and Dependability @ VU

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-12-16 13:25:25
120Table of Contents Short Paper of Data Mining Data Mining for Finance and Stock Market Applications An Application of Data Mining in Consumer Credit………………………………….1 Markus Hoechstoetter, Abdolreza

Table of Contents Short Paper of Data Mining Data Mining for Finance and Stock Market Applications An Application of Data Mining in Consumer Credit………………………………….1 Markus Hoechstoetter, Abdolreza

Add to Reading List

Source URL: www.ibai-publishing.org

Language: English - Date: 2013-09-12 08:17:26