Intrusion detection system

Results: 338



#Item
151IDS – Intrusion Detection System  IDS Intrusion Detection System

IDS – Intrusion Detection System IDS Intrusion Detection System

Add to Reading List

Source URL: www.domhan.de

Language: German - Date: 2005-01-16 13:27:53
    152Improvements in Security Alert Analysis with a Truth Maintenance System

    Improvements in Security Alert Analysis with a Truth Maintenance System

    Add to Reading List

    Source URL: www.hicss.hawaii.edu

    Language: English - Date: 2007-11-29 01:14:03
    153EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

    EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

    Add to Reading List

    Source URL: www.cs.virginia.edu

    Language: English - Date: 2002-07-23 16:30:01
    154Intrusion Detection System Sensor Protection Profile

    Intrusion Detection System Sensor Protection Profile

    Add to Reading List

    Source URL: sertit.no

    Language: English - Date: 2013-09-19 06:43:38
    155Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

    Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

    Add to Reading List

    Source URL: www.s0ftpj.org

    Language: English - Date: 2006-07-14 18:58:00
    156Fates: A Peicewise view of Networks

    Fates: A Peicewise view of Networks

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-13 12:13:20
    157Politecnico di Milano  Dip. Elettronica e Informazione Milano, Italy  Detecting 0-day attacks with

    Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Detecting 0-day attacks with

    Add to Reading List

    Source URL: www.s0ftpj.org

    Language: English - Date: 2007-01-25 16:48:54
    158IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

    IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

    Add to Reading List

    Source URL: www.getadvanced.net

    Language: English - Date: 2013-04-16 08:43:37
    159Deploying Statistical Anomaly Detection to Improve Cyber Security: Strategy, Benefits, and Results Dr. Greg Shannon, Chief Scientist, CounterStorm, Inc. There will always be new vulnerabilities in the information network

    Deploying Statistical Anomaly Detection to Improve Cyber Security: Strategy, Benefits, and Results Dr. Greg Shannon, Chief Scientist, CounterStorm, Inc. There will always be new vulnerabilities in the information network

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-11 16:57:20
    160Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

    Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-11 08:59:10