11![Microsoft Word - Intrusion Detection Systems as Evidence.doc Microsoft Word - Intrusion Detection Systems as Evidence.doc](https://www.pdfsearch.io/img/3b47e4d05cb27e04308de5258b0b1b90.jpg) | Add to Reading ListSource URL: www.pmsommer.comLanguage: English - Date: 2013-08-25 05:48:58
|
---|
12![Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems ∗ † Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems ∗ †](https://www.pdfsearch.io/img/b78090df36e464b2c16c2cf0f8db9e23.jpg) | Add to Reading ListSource URL: aronlaszka.comLanguage: English - Date: 2015-08-30 01:31:31
|
---|
13![The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin](https://www.pdfsearch.io/img/580ccdbd0cb033319a09f7990a56ee03.jpg) | Add to Reading ListSource URL: www.troopers.deLanguage: English - Date: 2014-12-14 12:00:01
|
---|
14![Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015 Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015](https://www.pdfsearch.io/img/fbd951edf7203a71bd0680916bceeb5a.jpg) | Add to Reading ListSource URL: home.regit.orgLanguage: English - Date: 2015-10-01 09:35:59
|
---|
15![Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter, Eckehard Hermann, Markus Zeilinger Department of Secure Information Systems Upper Austria University of App Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter, Eckehard Hermann, Markus Zeilinger Department of Secure Information Systems Upper Austria University of App](https://www.pdfsearch.io/img/7d05c19c21a634ebf1bd19521aac0c00.jpg) | Add to Reading ListSource URL: nymity.chLanguage: English - Date: 2015-12-06 00:57:12
|
---|
16![Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org](https://www.pdfsearch.io/img/9bb60c1a60f6cb7c019d582f8edfc217.jpg) | Add to Reading ListSource URL: home.regit.orgLanguage: English - Date: 2013-09-19 13:58:52
|
---|
17![A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1, Wenke Lee2, David Schimmel1, Didier Contis1, Mohamed Koné2, Ashley Thomas2 Center for Experimental Research in Computer Systems (CERCS) Ge A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1, Wenke Lee2, David Schimmel1, Didier Contis1, Mohamed Koné2, Ashley Thomas2 Center for Experimental Research in Computer Systems (CERCS) Ge](https://www.pdfsearch.io/img/718f73f0472bfc9429342d0db8e88f74.jpg) | Add to Reading ListSource URL: wenke.gtisc.gatech.eduLanguage: English - Date: 2011-08-22 15:12:58
|
---|
18![Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi](https://www.pdfsearch.io/img/a9b7ee951ec60a146bdaf88fe16278af.jpg) | Add to Reading ListSource URL: ristov.github.ioLanguage: English - Date: 2016-03-01 13:52:01
|
---|
19![Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A. Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.](https://www.pdfsearch.io/img/5b84dc0ab0bb0e509b6dd272a26e4a83.jpg) | Add to Reading ListSource URL: wenke.gtisc.gatech.eduLanguage: English - Date: 2011-08-22 15:12:58
|
---|
20![Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e](https://www.pdfsearch.io/img/8106f4a16c395288492a9fe3cfc96154.jpg) | Add to Reading ListSource URL: www1.icsi.berkeley.eduLanguage: English - Date: 2012-09-26 16:43:02
|
---|