Intrusion detection systems

Results: 104



#Item
21Log Analysis using OSSEC Daniel B. Cid  Copyright 2007 Daniel B. Cid

Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

Add to Reading List

Source URL: ossec.net

Language: English - Date: 2012-06-29 13:37:34
22Intrusion Detection Systems and IPv6∗ Arrigo Triulzi  Abstract In this paper we will discuss the new challenges posed by the introduction of IPv6 to Intrusion Detection

Intrusion Detection Systems and IPv6∗ Arrigo Triulzi Abstract In this paper we will discuss the new challenges posed by the introduction of IPv6 to Intrusion Detection

Add to Reading List

Source URL: www.alchemistowl.org

- Date: 2007-05-11 03:50:02
    23Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA

    Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA

    Add to Reading List

    Source URL: hms.isi.jhu.edu

    Language: English - Date: 2012-02-05 23:54:00
      24Intrusion detection for resource-constrained embedded control systems in the power grid

      Intrusion detection for resource-constrained embedded control systems in the power grid

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2012-06-21 17:59:04
      25Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

      Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:18
      26Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

      Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2011-07-11 16:31:17
      27Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

      Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

      Add to Reading List

      Source URL: www.gammassl.co.uk

      Language: English - Date: 2013-01-11 08:20:35
      28Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER  Open Access

      Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access

      Add to Reading List

      Source URL: www.journalofbigdata.com

      Language: English
      29COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

      COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

      Add to Reading List

      Source URL: www.csc.ncsu.edu

      Language: English - Date: 2013-12-09 11:41:13
      30Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University  Several alert correlation methods have been proposed over the past several years

      Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:18