Intrusion detection system

Results: 338



#Item
71Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
72Text messaging / Advantage / 9 Metis / Bayesian network / Wireless / Mobile technology / Technology / SMS

METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures? Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou Chalmers University of Technology, Gothenburg, Sweden vinmas,almgren,ptri

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:40:32
73Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
74Software / Intrusion prevention system / System administration / Intrusion detection system / EnGarde Secure Linux / Network security / Computer network security / System software / Computer security

Internet Defense and Detectionindd

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:56
75Intrusion detection system / Content-addressable memory / Computer security / Cyberwarfare / Computer network security / Security / Computing

Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:20:35
76Computer security / Companies listed on the New York Stock Exchange / Computing / Malware / Netflow / Network security / Intrusion prevention system / Network Behavior Anomaly Detection / McAfee VirusScan / McAfee / Computer network security / System software

Data Sheet McAfee Network Threat Behavior Analysis Get complete visibility into network behavior and threats.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-05-05 14:02:43
77Computing / Information technology management / Computer security / Formal sciences / System administration / Anomaly detection / Data quality / Data mining / Intrusion prevention system / Computer network security / System software / Intrusion detection systems

Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access

Add to Reading List

Source URL: www.journalofbigdata.com

Language: English
78Snort / Thresh / Intrusion detection system / Pcap / Preprocessor / Sourcefire / Network intrusion detection system / Network packet / ACARM-ng / Software / Computer network security / System software

R Users Manual SNORTThe Snort Project

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-04-24 17:44:05
79Educational psychology / Data analysis / IP multicast / Quality of service / Multicast / E-learning / Visualization / Intrusion detection system / Educational technology / Education / Internet / Knowledge

COMPUTER SCIENCE RESEARCH PROJECTS 2000 CAREER:Towards Estimating Requirement Coverage: Managing Goals and Scenarios during Requirements Evolution Ana I. Anton

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2013-12-09 11:41:13
80Cyberwarfare / Intrusion detection system / Anomaly detection / Computing / Battery charger / Denial-of-service attack / Security / Computer network security / Data security / Computer security

Battery-Sensing Intrusion Protection for Wireless Handheld Computers using a Dynamic Threshold Calculation Algorithm for Attack Detection

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2006-12-19 22:22:36
UPDATE