Intrusion detection system

Results: 338



#Item
141BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 09:24:18
142Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery AKA: B!n@ry

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery AKA: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-14 04:47:49
143The Challenges of HTTP Intrusion Detection  The Challenges of HTTP Intrusion Detection

The Challenges of HTTP Intrusion Detection The Challenges of HTTP Intrusion Detection

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
144Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1  Department of Computer Science, Oklahoma State University, USA

Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 Department of Computer Science, Oklahoma State University, USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2005-02-04 10:21:43
145Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
146DATASHEET  InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

DATASHEET InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

Add to Reading List

Source URL: offers.skybotsoftware.com

Language: English - Date: 2015-01-15 14:53:02
147Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Add to Reading List

Source URL: titania.ctie.monash.edu.au

Language: English - Date: 2013-05-26 19:08:58
148Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-30 12:44:13
149Firestorm Network Intrusion Detection System John Leach [removed]

Firestorm Network Intrusion Detection System John Leach [removed]

Add to Reading List

Source URL: www.scaramanga.co.uk

Language: English - Date: 2004-12-10 21:14:27
150CHAP TER  1 2  Recognition Strategies: Intrusion Detection and Prevention INFORMATION IN THIS CHAPTER 	 Intrusion detection

CHAP TER  1 2 Recognition Strategies: Intrusion Detection and Prevention INFORMATION IN THIS CHAPTER Intrusion detection

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2014-09-02 12:39:05