Intrusion detection system

Results: 338



#Item
121Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1  Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-08-08 19:37:58
122Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
123Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
124IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
125Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
126Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-10-22 16:33:27
127Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007  Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
128The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
129Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
130Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36