Intrusion detection system

Results: 338



#Item
161Computing / Intrusion prevention system / Intrusion detection system / Extrusion detection / Computer security / Sguil / Computer network security / Security / Cyberwarfare

Traditional IDS Should Be Dead Richard Bejtlich [removed] www.taosecurity.com / taosecurity.blogspot.com 1

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
162Data mining / Anomaly detection / Intrusion detection system / Computer security / Anomaly / Misuse detection / Outlier / Anomaly-based intrusion detection system / Statistics / Data security / Data analysis

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-10 13:37:55
163Security / Attack / Threat / Intrusion detection system / Computer security incident management / Computer network security / Computer security / Cyberwarfare

MARITIME AND PORT AUTHORITY OF SINGAPORE PORT MARINE NOTICE NO. 22 OF[removed]Mar 2015

Add to Reading List

Source URL: www.mpa.gov.sg

Language: English - Date: 2015-03-01 22:44:50
164Security / Attack / Threat / Intrusion detection system / Computer security incident management / Computer network security / Computer security / Cyberwarfare

Incident Response Methodology

Add to Reading List

Source URL: www.oas.org

Language: English
165Computer security / Intrusion detection system / Snort / Network intrusion detection system / Anomaly detection / Martin Roesch / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / System software / Software

DOC Document

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:21:20
166Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-02-05 20:56:16
167Measurement / Data / Information / Application protocol-based intrusion detection system / Transmission Control Protocol / Communications protocol / Space Communications Protocol Specifications / CCSDS / Committees / Consultative Committee for Space Data Systems

Microsoft Word - Corrigendum 2_final.doc

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-05-01 13:08:54
168Computer network security / Data security / Anomaly detection / Intrusion detection system / Cluster analysis / Peer-to-peer / Traffic classification / Network security / SFlow / Statistics / Data mining / Data analysis

3-2 D  ata Mining over Network Streams BAN Tao and KADOBAYASHI Youki Network monitoring and analyzing systems (NMASes) have been playing an active roll for preventing cyber attacks and providing practical and proactive

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:05:58
169Cross-platform software / Relational database management systems / Statistics / Database management systems / Oracle Data Mining / Anomaly detection / Intrusion detection system / Misuse detection / Oracle RAC / Software / Data security / Computing

Microsoft Word - CamposMilenovaICDM05_8pages.doc

Add to Reading List

Source URL: www.oracle.com

Language: English
170Bell System / Telcordia Technologies / Vulnerability / Information assurance / Quality assurance / Intrusion detection system / Security / Cyberwarfare / Computer security

Microsoft PowerPoint - 09_Telcordia

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
UPDATE