Network intrusion detection system

Results: 247



#Item
91Computer security / Snort / McAfee / Malware / Intrusion prevention system / Intrusion detection system / Microsoft Security Essentials / Sourcefire / Computer network security / Software / System software

White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-20 18:39:36
92Computing / Suricata / Intrusion detection system / Ubuntu / Firewall / Malware / Debian / Intrusion prevention system / Snort / Software / Computer network security / System software

COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

Add to Reading List

Source URL: www.countersnipe.com

Language: English - Date: 2014-11-25 12:45:19
93System software / Honeypot / Spamming / MINIX / Andrew S. Tanenbaum / Smartphone / Intrusion detection system / Computing platforms / MINIX 3 / Computer architecture / Computing / Computer network security

Security and Dependability @ VU

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-12-16 13:25:25
94Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
95Security / Network security / Zero-day attack / Layered security / Pass the hash / Intrusion prevention system / Password / Malware / Attack / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
96Intrusion detection system / OSSEC / Snort / Intrusion prevention system / NuFW / Alert correlation / System software / Software / Computer network security

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
97Computer security / Intrusion detection system / Petri net / Bro / AAFID / Computer network security / Security / Cyberwarfare

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
98Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
99Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
100Cyberwarfare / Intrusion detection system / Bro / Computer network security / Security / Computer security

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35
UPDATE