Intrusion detection systems

Results: 104



#Item
61Microsoft Word - CamposMilenovaICDM05_8pages.doc

Microsoft Word - CamposMilenovaICDM05_8pages.doc

Add to Reading List

Source URL: www.oracle.com

Language: English
62The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2004-02-19 15:54:40
63Lan-Secure  Security Center If network security is your most important asset You need Security Center to help you keep it that way

Lan-Secure Security Center If network security is your most important asset You need Security Center to help you keep it that way

Add to Reading List

Source URL: www.lan-secure.com

Language: English - Date: 2015-01-10 16:01:14
64Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Add to Reading List

Source URL: in.nec.com

Language: English - Date: 2013-05-20 06:49:00
65Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-02 00:42:29
66Microsoft Word - aaai_final.doc

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
67Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
68Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-01-29 21:32:35
69Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 10:21:44
70Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30