Intrusion detection system

Results: 338



#Item
21Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:23
22ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-03 07:52:04
23THREAT DETECT DIAGRAM v10 CTP copy

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
24Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern  Lazi

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
25NGFW Test Report_Dell SonicWALL SuperMassive E10800

NGFW Test Report_Dell SonicWALL SuperMassive E10800

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-28 09:34:46
26In-Network PCA and Anomaly Detection  Ling Huang UC Berkeley  XuanLong Nguyen

In-Network PCA and Anomaly Detection Ling Huang UC Berkeley XuanLong Nguyen

Add to Reading List

Source URL: dept.stat.lsa.umich.edu

Language: English - Date: 2006-11-07 02:47:35
27SyScan’14, April 2–4, 2014, Singapore, Singapore  Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
28Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project  Tor Tech Report

Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech Report

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2015-10-29 15:50:00
29

Personal Security Personnel screening, Segregation of duties, Confidentiality and appropriate use agreements System Monitoring and Control System hardening, threat detection, intrusion prevention, network/system logging,

Add to Reading List

Source URL: www.vascan.org

- Date: 2007-08-21 14:03:33
    30BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2007-05-15 01:33:26