Intrusion detection systems

Results: 104



#Item
1

PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB

Add to Reading List

Source URL: www.rennes.supelec.fr

Language: English - Date: 2009-10-01 09:50:26
    2

    Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗  † Institute of Computer Science

    Add to Reading List

    Source URL: dcs.ics.forth.gr

    - Date: 2012-03-22 09:28:01
      3

      Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation

      Add to Reading List

      Source URL: www.ics.forth.gr

      - Date: 2012-03-22 09:27:59
        4

        Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

        Add to Reading List

        Source URL: homeostasis.scs.carleton.ca

        - Date: 2007-01-02 10:18:15
          5

          Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC

          Add to Reading List

          Source URL: moss.csc.ncsu.edu

          - Date: 2010-03-29 18:00:23
            6

            Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

            Add to Reading List

            Source URL: netcom.army.mil

            - Date: 2009-10-26 18:26:12
              7

              Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development

              Add to Reading List

              Source URL: www.icsd.aegean.gr

              - Date: 2013-11-25 06:34:42
                8

                This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

                Add to Reading List

                Source URL: www.cs.unm.edu

                - Date: 2010-04-09 00:32:36
                  9Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

                  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

                  Add to Reading List

                  Source URL: www.cyber-ta.org

                  Language: English - Date: 2007-06-29 16:14:13
                  10Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition

                  Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

                  Add to Reading List

                  Source URL: norbert-pohlmann.com

                  Language: English - Date: 2015-10-20 12:57:31
                  UPDATE