Intrusion detection system

Results: 338



#Item
321Computer network security / Information technology management / Intrusion detection system / Anomaly detection / Wireless intrusion prevention system / Misuse detection / Intrusion detection system evasion techniques / Intrusion prevention system / Data security / Computer security / Security

ISSN:[removed]Dr Guruprasad Khataniar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), [removed]

Add to Reading List

Source URL: ijcscn.com

Language: English - Date: 2012-08-28 09:07:11
322Information technology management / Statistics / Intrusion detection system / Anomaly detection / Audit trail / Information technology security audit / Audit / Association rule learning / Vulnerability / Data mining / Security / Auditing

Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns Stephen C-Y Lu

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:42:02
323Data security / Sendmail / Computer network security / Syslog / Daemon / Anomaly detection / Intrusion detection system / Artificial immune system / Email forwarding / Computing / Information technology management / System software

A Sense of Self for Unix Processes Stephanie Forrest Steven A. Hofmeyr

Add to Reading List

Source URL: webpages.math.luc.edu

Language: English - Date: 2008-06-17 14:44:54
324Crime prevention / National security / Data security / Security event manager / Computer network security / Vulnerability / Information security / Intrusion detection system / Security information and event management / Computer security / Security / Cyberwarfare

Information Security Preparing for Security Event Management

Add to Reading List

Source URL: www.windowsecurity.com

Language: English - Date: 2007-02-27 04:40:18
325Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Local outlier factor / Network performance / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection† Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2003-03-21 18:36:29
326Computing / Snort / Thresh / Intrusion detection system / Pcap / Network intrusion detection system / Tcpdump / Packet capture / Firewall / Software / Computer network security / System software

PDF Document

Add to Reading List

Source URL: people.cs.ubc.ca

Language: English - Date: 2004-09-02 20:36:22
327Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Network performance / Local outlier factor / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

PDF Document

Add to Reading List

Source URL: www.siam.org

Language: English - Date: 2008-05-13 10:17:41
328Information technology management / Security / System administration / Data security / Log analysis / Syslog / Security log / Information security / Intrusion detection system / Computer security / Computing / Network management

PDF Document

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2004-11-03 20:57:02
329Malware / Intrusion detection system / Anomaly detection / Smartphone / Network security / Computer virus / Computing / Information technology management / Security / Antivirus software / Data security / Data mining

PDF Document

Add to Reading List

Source URL: www.dai-labor.de

Language: English - Date: 2009-11-02 05:19:46
330Anomaly detection / Data security / Anomaly / Outlier / Computer-aided audit tools / Intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Data mining

PDF Document

Add to Reading List

Source URL: www.cs.umn.edu

Language: English - Date: 2008-10-16 10:32:33
UPDATE