Intrusion detection systems

Results: 104



#Item
41Chapter 2  Installation Solutions in this chapter: ■

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
42Application Intrusion Detection  Drew Miller Black Hat Consulting  Application Intrusion Detection

Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
43Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Add to Reading List

Source URL: rpgoldman.goldman-tribe.org

Language: English - Date: 2009-08-06 12:04:58
44Systems Security Research at POLIMI Federico Maggi Stefano Zanero 2

Systems Security Research at POLIMI Federico Maggi Stefano Zanero 2

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:22:30
45COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

Add to Reading List

Source URL: www.countersnipe.com

Language: English - Date: 2014-11-25 12:45:19
46Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
47Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007  Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
48The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
49Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx  Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35
50Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Add to Reading List

Source URL: www.milestonesys.com

Language: English - Date: 2015-01-05 10:29:44