21![Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid](https://www.pdfsearch.io/img/8cfa0014974c876b9cabc9d76318cc50.jpg) | Add to Reading ListSource URL: ossec.netLanguage: English - Date: 2012-06-29 13:37:34
|
---|
22![Intrusion Detection Systems and IPv6∗ Arrigo Triulzi Abstract In this paper we will discuss the new challenges posed by the introduction of IPv6 to Intrusion Detection Intrusion Detection Systems and IPv6∗ Arrigo Triulzi Abstract In this paper we will discuss the new challenges posed by the introduction of IPv6 to Intrusion Detection](https://www.pdfsearch.io/img/0b344521702f77cde7803c5d3e8933fc.jpg) | Add to Reading ListSource URL: www.alchemistowl.org- Date: 2007-05-11 03:50:02
|
---|
23![Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA](https://www.pdfsearch.io/img/0a6df3f8a67d3a9b84518ed53cdd5199.jpg) | Add to Reading ListSource URL: hms.isi.jhu.eduLanguage: English - Date: 2012-02-05 23:54:00
|
---|
24![Intrusion detection for resource-constrained embedded control systems in the power grid Intrusion detection for resource-constrained embedded control systems in the power grid](https://www.pdfsearch.io/img/7207244de059e6e31d940bcd3f2a630b.jpg) | Add to Reading ListSource URL: www.cs.dartmouth.eduLanguage: English - Date: 2012-06-21 17:59:04
|
---|
25![Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom](https://www.pdfsearch.io/img/5d8da0280af5a5b9fb6411066144b80f.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:18
|
---|
26![Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith](https://www.pdfsearch.io/img/65d624cffbfabef90712ddaca6096850.jpg) | Add to Reading ListSource URL: www.cs.dartmouth.eduLanguage: English - Date: 2011-07-11 16:31:17
|
---|
27![Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited](https://www.pdfsearch.io/img/67479364f2ca8407d7354a40de4f700e.jpg) | Add to Reading ListSource URL: www.gammassl.co.ukLanguage: English - Date: 2013-01-11 08:20:35
|
---|
28![Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access](https://www.pdfsearch.io/img/0711763cca494bd6bf308fa47c2119ec.jpg) | Add to Reading ListSource URL: www.journalofbigdata.comLanguage: English |
---|
29![COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation](https://www.pdfsearch.io/img/d025b80101a6d2802a02e0ef00abc81f.jpg) | Add to Reading ListSource URL: www.csc.ncsu.eduLanguage: English - Date: 2013-12-09 11:41:13
|
---|
30![Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years](https://www.pdfsearch.io/img/3610e278b490cede85b795c9a3ef77e5.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:18
|
---|