Intrusion detection system

Results: 338



#Item
201Software / Intrusion detection systems / Snort / Evasion / Intrusion detection system / Intrusion detection system evasion techniques / Denial-of-service attack / Buffer overflow / Network intrusion detection system / Computer network security / Cyberwarfare / Computer security

IDS Evasion Techniques and Tactics

Add to Reading List

Source URL: bandwidthco.com

Language: English - Date: 2012-02-12 19:18:28
202Variance / Intrusion detection system / Standard deviation / Database / Anomaly detection / Statistics / Data analysis / Normal distribution

Temporal Signatures for Intrusion Detection Anita Jones Song Li [removed]

Add to Reading List

Source URL: cs.fit.edu

Language: English - Date: 2002-03-07 16:12:59
203Software / Anomaly detection / Intrusion detection system / Network intrusion detection system / Bro / Statistical classification / Korea New Network / K-nearest neighbor algorithm / Computer network security / System software / Computer security

DNIDS: A Dependable Network Intrusion Detection System Using the CSI-KNN Algorithm by

Add to Reading List

Source URL: www.collectionscanada.gc.ca

Language: English - Date: 2007-10-26 05:15:31
204Microsoft Windows / Computer network security / Windows Server / Snort / Pcap / Windows / Intrusion detection system / MySQL / Thresh / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 14:12:28
205Microsoft Windows / Computer network security / Windows Server / Snort / Pcap / Windows / Intrusion detection system / MySQL / Thresh / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 16:41:50
206National security / Intrusion detection system / Network intrusion detection system / Computer security / Network security / Physical security / Extrusion detection / Computer network security / Security / Public safety

Mission Control Network Intrusion Detection System How can I protect the assets of my company by identifying attacks before they damage and disrupt business operations? To efficiently protect your confidential data, busi

Add to Reading List

Source URL: www.open.ch

Language: English - Date: 2014-04-25 03:08:19
207Computer security / Intrusion prevention system / Fortinet / Denial-of-service attack / Bypass switch / Intrusion detection system / Evasion / IPS / Network security / Computer network security / Cyberwarfare / Computing

Intrusion Prevention System (IPS) Intrusion Prevention System (IPS) technology protects your network from cybercriminal attacks by actively seeking and blocking external threats before they can reach potentially vulnerab

Add to Reading List

Source URL: docs.fortinet.com

Language: English - Date: 2014-07-17 14:49:56
208Computing / Intrusion detection system / Intrusion prevention system / Firewall / Network intrusion detection system / Denial-of-service attack / Network security / Anomaly detection / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Microsoft Word - IntruPro IPS White Paper1.doc

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:20
209Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:19
210Computing / Telecommuting / Network intrusion detection system / Personal firewall / Intrusion prevention system / Network security / Wireless security / Intrusion detection system / Spyware / Computer network security / Cyberwarfare / Computer security

UNCLASSIFIED COTS SECURITY GUIDANCE (CSG) TELEWORK

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-23 04:42:06
UPDATE