Network intrusion detection system

Results: 247



#Item
1

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Add to Reading List

Source URL: ieee-ssci2018.org

Language: English - Date: 2018-04-07 06:55:01
    2

    ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    Add to Reading List

    Source URL: www.alertlogic.com

    Language: English - Date: 2018-08-16 13:48:55
      3

      Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

      Add to Reading List

      Source URL: netcom.army.mil

      - Date: 2009-10-26 18:26:12
        4Computing / Computer network security / Cloud clients / Information appliances / Cybercrime / Mobile phones / Computer security / Intrusion detection system / Android / Mobile device / Malware / Smartphone

        Microsoft Word - Call_CRC_gk

        Add to Reading List

        Source URL: www.icsd.aegean.gr

        Language: English - Date: 2016-01-26 04:44:13
        5Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

        CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

        Add to Reading List

        Source URL: jon.oberheide.org

        Language: English - Date: 2015-10-11 18:23:54
        6Computer security / Computer network security / Security / Cyberwarfare / Computer network operations / Campaign for Nuclear Disarmament / Threat / Intrusion detection system

        Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

        Add to Reading List

        Source URL: www.tsc.com

        Language: English - Date: 2015-08-27 14:40:43
        7Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

        BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2007-06-29 16:14:13
        8Wireless networking / Wireless / Computing / Technology / Mobile ad hoc network / Wireless ad hoc network / Wireless intrusion prevention system / Mesh networking / Wireless sensor network / Rogue access point / Intrusion detection system / Wireless LAN

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-23 09:05:31
        9Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

        Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

        Add to Reading List

        Source URL: esd.ny.gov

        Language: English - Date: 2016-04-19 12:12:44
        10Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

        Anomaly detection from server log data. A case study

        Add to Reading List

        Source URL: www.vtt.fi

        Language: English - Date: 2015-03-18 09:57:49
        UPDATE