Intrusion detection systems

Results: 104



#Item
81Alarms / Burglar alarm / Warning systems / Intrusion detection system / Submittals / Alarm devices / Annunciator panel / Verification and validation / Tamper resistance / Safety / Security / Prevention

NL Master Specification Guide for Public Funded Buildings Issued[removed] Section[removed] – Intrusion Detection (Form 1) Page 1 of 7 General

Add to Reading List

Source URL: www.tw.gov.nl.ca

Language: English - Date: 2009-11-16 09:27:59
82Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Babak Salamat, Todd Jackson, Andreas Gal, and Michael Franz Secure Systems and Languages Laboratory Department of C

Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Babak Salamat, Todd Jackson, Andreas Gal, and Michael Franz Secure Systems and Languages Laboratory Department of C

Add to Reading List

Source URL: eurosys2009.informatik.uni-erlangen.de

Language: English - Date: 2009-04-19 11:57:08
83Newsletter  APRIL 21, 2009 Ingate Knowledge Base - a vast resource for information about all things SIP – including security, VoIP, SIP trunking etc. - just for the reseller community. Drill down for more info!

Newsletter APRIL 21, 2009 Ingate Knowledge Base - a vast resource for information about all things SIP – including security, VoIP, SIP trunking etc. - just for the reseller community. Drill down for more info!

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2009-04-30 05:15:34
84Audit and IDS Steve Grubb, Red Hat Linux Audit and Intrusion Detection Systems ● ●

Audit and IDS Steve Grubb, Red Hat Linux Audit and Intrusion Detection Systems ● ●

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2008-06-30 09:16:30
85LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

Add to Reading List

Source URL: ccl.northwestern.edu

Language: English - Date: 2013-03-28 17:03:17
86Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
87Detecting Critical Nodes for MANET Intrusion Detection Systems A. Karygiannis, E. Antonakakis, and A. Apostolopoulos National Institute of Standards and Technology {karygiannis, manos, aimilios}@nist.gov Abstract Ad hoc

Detecting Critical Nodes for MANET Intrusion Detection Systems A. Karygiannis, E. Antonakakis, and A. Apostolopoulos National Institute of Standards and Technology {karygiannis, manos, aimilios}@nist.gov Abstract Ad hoc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
88IBDSS  Ultimate Surveillance Integration Integrated Base Defense (IBDSS) combines detection and assessment capabilities to provide a real time, complete operational picture for the

IBDSS Ultimate Surveillance Integration Integrated Base Defense (IBDSS) combines detection and assessment capabilities to provide a real time, complete operational picture for the

Add to Reading List

Source URL: forcepro.ara.com

Language: English - Date: 2014-10-22 15:54:24
89Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

Add to Reading List

Source URL: etd.ncsi.iisc.ernet.in

Language: English - Date: 2014-06-03 01:23:39
90NetOps / LandWarNet / PM Warfighter Information Network-Tactical

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:26:12