Intrusion detection system

Results: 338



#Item
131Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx  Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35
132Minimizing Cost when using Globally Distributed Cloud Services: A Case Study in Analysis of Intrusion Detection Workflow Application Suraj Pandey1, Kapil Kumar Gupta1 , Adam Barker2 , Rajkumar Buyya1 1  The Cloud Computi

Minimizing Cost when using Globally Distributed Cloud Services: A Case Study in Analysis of Intrusion Detection Workflow Application Suraj Pandey1, Kapil Kumar Gupta1 , Adam Barker2 , Rajkumar Buyya1 1 The Cloud Computi

Add to Reading List

Source URL: www.cloudbus.org

Language: English - Date: 2009-08-29 07:12:44
133Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Add to Reading List

Source URL: www.milestonesys.com

Language: English - Date: 2015-01-05 10:29:44
134toolsmith  ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

toolsmith ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2011-05-02 15:02:44
1359. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2006-12-26 09:46:58
136Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-22 19:34:56
137Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-03 19:27:50
138COLLOQUIA LECTURE HARRIS LIN Thursday, April 16, 2015 3:40 p.m. 223 Atanasoff Hall

COLLOQUIA LECTURE HARRIS LIN Thursday, April 16, 2015 3:40 p.m. 223 Atanasoff Hall

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-04-09 11:00:52
139Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-06 20:00:57
140Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-04 04:12:49