Intrusion detection system

Results: 338



#Item
81Science / Scientific modeling / Data / Data analysis / Data mining / Database / Systems engineering / Intrusion detection system / Relational database / Database management systems / Database theory / Data management

COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2013-12-09 11:41:13
82Intrusion detection system / Lecture Notes in Computer Science / RAID

CALL FOR PAPERS RAID 2004 Seventh International Symposium on Recent Advances in Intrusion Detection Intrusion Detection and Society Institut Eurécom, Sophia-Antipolis, French Riviera, France - September 15-17, 2004 http

Add to Reading List

Source URL: raid04.eurecom.fr

Language: English - Date: 2004-05-17 09:41:07
83Internet privacy / Law / Privacy / Computing / Computer security / Cryptography / Intrusion detection system / Node / Ethics / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:28:47
84Fetchmail / Intrusion detection system / Data mining / Fingerprint / Security / Computing / Global Information Assurance Certification / Computer security / SANS Institute

PDF Document

Add to Reading List

Source URL: www.advizorsolutions.com

Language: English - Date: 2014-12-22 15:24:26
85Electromagnetic radiation / Thermographic camera / Thermography / Infrared / Closed-circuit television / Motion detection / IP camera / Video content analysis / Intrusion detection system / Surveillance / Security / National security

FoxVigi Intrusion detection FoxVigi intrusion detection solution, which is one of the core developments of Foxstream, is the result of many years of research and collaboration with the laboratories of the CNRS and field

Add to Reading List

Source URL: www.foxstream-intelligencevideo.com

Language: English - Date: 2014-07-24 08:21:54
86Computer security / Data security / Intrusion detection systems / Snort / Anomaly detection / Network intrusion detection system / Intrusion prevention system / Alert correlation / Evasion / Computer network security / System software / Software

PDF Document

Add to Reading List

Source URL: romisatriawahono.net

Language: English - Date: 2013-01-23 01:11:11
87Computer security / Computing / Honeypot / Operating system / Vulnerability / Framework Programmes for Research and Technological Development / Idaho National Laboratory / Actor model / Intrusion detection system / Cyberwarfare / Computer network security / Spamming

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-07-14 10:04:31
88System software / Snort / Intrusion prevention system / Firewall / Intrusion detection system / Transmission Control Protocol / Deep packet inspection / Packet Processing / Network processor / Computer network security / Computing / Software

SafeCard: a Gigabit IPS on the network card Willem de Bruijn† , Asia Slowinska† , Kees van Reeuwijk† , Tomas Hruby† , Li Xu∗ , and Herbert Bos† † Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-06-27 14:10:05
89Data / Information / Tunneling protocols / Internet protocols / IPsec / Throughput / Internet Key Exchange / IPv6 / Intrusion detection system / Network architecture / Network performance / Cryptographic protocols

Microsoft Word - Thesis Final-signed.doc

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-13 18:21:42
90Spamming / Data mining / Data security / Data analysis / Anomaly detection / Intrusion detection system / Outlier / Anomaly / Politecnico di Milano / Statistics / Computer network security / Honeypot

Anomaly Detection and Honeypots: relationships, anyone? Stefano Zanero Politecnico di Milano Dipartimento di Elettronica e Informazione

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-20 05:15:16
UPDATE