Intrusion detection systems

Results: 104



#Item
61Cross-platform software / Relational database management systems / Statistics / Database management systems / Oracle Data Mining / Anomaly detection / Intrusion detection system / Misuse detection / Oracle RAC / Software / Data security / Computing

Microsoft Word - CamposMilenovaICDM05_8pages.doc

Add to Reading List

Source URL: www.oracle.com

Language: English
62AAFID / System software / Intrusion detection system / Software / Software agent / Mobile agent / Intelligent agent / Agent-based model / Open Source Tripwire / Artificial intelligence / Computer security / Computing

The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2004-02-19 15:54:40
63Software / Intrusion detection system / Intrusion prevention system / Network security / Surveillance / Clone Systems /  Inc. / Snort / Computer network security / Computer security / System software

Lan-Secure Security Center If network security is your most important asset You need Security Center to help you keep it that way

Add to Reading List

Source URL: www.lan-secure.com

Language: English - Date: 2015-01-10 16:01:14
64Crime prevention / Public safety / Security engineering / Warning systems / Surveillance / NEC / Burglar alarm / Closed-circuit television / Open Source Tripwire / Security / Safety / National security

Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Add to Reading List

Source URL: in.nec.com

Language: English - Date: 2013-05-20 06:49:00
65Software bugs / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / OpenBSD / Stack / Computing / Software engineering / Computer programming

Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-02 00:42:29
66Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
67Cyberwarfare / Software testing / Credit cards / Computer network security / Automated teller machine / Payment Card Industry Data Security Standard / Intrusion detection system / Host-based intrusion detection system / Penetration test / Computer security / Payment systems / Technology

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
68Crime prevention / Public safety / Security engineering / Warning systems / Surveillance / NEC / Burglar alarm / Closed-circuit television / Open Source Tripwire / Security / Safety / National security

Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-01-29 21:32:35
69Computational statistics / Artificial intelligence / C4.5 algorithm / ID3 algorithm / Association rule learning / ReD / Intrusion detection system / Ross Quinlan / Data Analysis Techniques for Fraud Detection / Machine learning / Decision trees / Data mining

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 10:21:44
70Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
UPDATE