Intrusion detection system

Results: 338



#Item
181Microsoft Word - aaai_final.doc

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
182Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Add to Reading List

Source URL: netvue.cs.arizona.edu

Language: English - Date: 2014-10-16 13:25:04
183Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
184THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2006-11-15 03:11:14
185Special Issue on Security for Network Society  Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
186Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 14:44:03
187Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 10:21:44
188ARTICLE IN PRESS  Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet  A multi-model approach to the detection of web-based attacks

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
189Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
190OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:50:03