Intrusion detection system

Results: 338



#Item
51Air Force Intrusion Detection System Evaluation Environment Terrence G. Champion   Robert S. Durst

Air Force Intrusion Detection System Evaluation Environment Terrence G. Champion Robert S. Durst

Add to Reading List

Source URL: www.raid-symposium.org

Language: English - Date: 2015-03-25 13:07:30
    52Technical Report of MRG Effitas and CrySyS Lab  An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

    Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

    Add to Reading List

    Source URL: blog.mrg-effitas.com

    Language: English - Date: 2014-12-03 11:48:39
    53Visio-DoS_paper_figures.vsd

    Visio-DoS_paper_figures.vsd

    Add to Reading List

    Source URL: mcn.cse.psu.edu

    Language: English - Date: 2009-01-20 15:41:05
    54A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

    A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

    Add to Reading List

    Source URL: www.gatsby.ucl.ac.uk

    Language: English - Date: 2006-10-19 19:27:44
    55Log Analysis using OSSEC Daniel B. Cid  Copyright 2007 Daniel B. Cid

    Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

    Add to Reading List

    Source URL: ossec.net

    Language: English - Date: 2012-06-29 13:37:34
    56INTRUSION DETECTION About the Course  Knowledge Transfer

    INTRUSION DETECTION About the Course Knowledge Transfer

    Add to Reading List

    Source URL: www.silensec.com

    Language: English - Date: 2014-04-29 06:18:44
    57INTRUSION DETECTION About the Course  Knowledge Transfer

    INTRUSION DETECTION About the Course Knowledge Transfer

    Add to Reading List

    Source URL: www.silensec.com

    Language: English - Date: 2014-04-29 06:12:38
    58The Human Immune System and Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +, Fax: +

    The Human Immune System and Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +, Fax: +

    Add to Reading List

    Source URL: www1.cs.columbia.edu

    - Date: 2004-11-06 17:54:40
      59Motivation Potential Solutions Samhain  SAMHAIN An open-source Host Intrusion Detection System (HIDS)

      Motivation Potential Solutions Samhain SAMHAIN An open-source Host Intrusion Detection System (HIDS)

      Add to Reading List

      Source URL: www.la-samhna.de

      Language: English - Date: 2011-03-10 08:49:37
        60Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

        Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2002-11-16 13:14:38