Intrusion detection system

Results: 338



#Item
171Computing / System administration / Domain name system / Fast flux / OSSEC / Intrusion detection system / Malware / Advanced persistent threat / Splunk / System software / Computer network security / Computer security

Microsoft Word - JWP_Binde_McRee_OConnor_OnePageSumm.docx

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-01-28 15:59:41
172AAFID / System software / Intrusion detection system / Software / Software agent / Mobile agent / Intelligent agent / Agent-based model / Open Source Tripwire / Artificial intelligence / Computer security / Computing

The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2004-02-19 15:54:40
173Application protocol-based intrusion detection system / Technology / Statistics / Science / Communication / Telemetry / IDL

SSC Support for Sim #3 • Archived MOC Data Products, and distributed via web. – Level-0 telemetry files organized by year and month – SPICE orbit and attitude files processed, organized, and put into SolarSoft

Add to Reading List

Source URL: stereo-ssc.nascom.nasa.gov

Language: English - Date: 2006-05-23 11:22:33
174Software / Intrusion detection system / Intrusion prevention system / Network security / Surveillance / Clone Systems /  Inc. / Snort / Computer network security / Computer security / System software

Lan-Secure Security Center If network security is your most important asset You need Security Center to help you keep it that way

Add to Reading List

Source URL: www.lan-secure.com

Language: English - Date: 2015-01-10 16:01:14
175Software / ACARM-ng / Computer network security / Intrusion detection system / System software

In this real-world case study presentation you will see how scripting was used to generate an actionable report based on the IDS alerts causing the most problems. This scripting enabled our organization to make the most

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:05
176Optical fiber / Intrusion detection system / Fusionopolis / Fiber optic sensor / Security engineering / Future Fibre Technologies / Sensors / Security / Technology

Fiber Optic Sensor for Perimeter Fence Intrusion Detection Technology Overview This demonstration shows one of our core competencies in fiber optics sensors – FBG-based sensor for perimeter fence intrusion detection. T

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2013-09-05 07:27:18
177Data mining / Data security / Spam filtering / Intrusion detection system / Burglar alarm / Base rate fallacy / Receiver operating characteristic / Type I and type II errors / Anomaly detection / Statistics / Security / Safety

The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection Stefan Axelsson Department of Computer Engineering Chalmers University of Technology Goteborg,

Add to Reading List

Source URL: www.raid-symposium.org

Language: English - Date: 2002-04-05 12:17:29
178Technology / Fiber Bragg grating / Intrusion detection system / Sensors / Fusionopolis / Queenstown /  Singapore

02 - Fingerprint Biometrics Liveness Detection

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2014-10-30 23:09:48
179Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
180Software / Anti-spam techniques / Message transfer agent / Intrusion detection system / Malware / Antivirus software / Computer virus / VMware / Simple Mail Transfer Protocol / Email / Computer-mediated communication / Computing

An Email Worm Vaccine Architecture Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science, Columbia University {stelios,ji,angelos,sal}@cs.columbia.edu Abstract.

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-01-30 15:22:18
UPDATE