Intrusion detection system

Results: 338



#Item
31Computing / System software / Software / Internet Standards / Intrusion detection systems / Bro / System administration / Network management / Internet protocols / Syslog / NetFlow / Dynamic Host Configuration Protocol

The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin

Add to Reading List

Source URL: www.troopers.de

Language: English - Date: 2014-12-14 12:00:01
32Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2015-10-01 09:35:59
33Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-03-28 12:39:15
34Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
35Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:32
36

A Streaming Intrusion Detection System for Grid Computing Environments Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2010-11-03 12:17:51
    37Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

    Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:10
    38Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

    The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2012-03-22 16:55:00
    39Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

    Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

    Add to Reading List

    Source URL: home.regit.org

    Language: English - Date: 2013-09-19 13:58:52
    40Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

    Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35
    UPDATE