Network intrusion detection system

Results: 247



#Item
91White Paper  The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-20 18:39:36
92COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

Add to Reading List

Source URL: www.countersnipe.com

Language: English - Date: 2014-11-25 12:45:19
93Security and Dependability @ VU

Security and Dependability @ VU

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-12-16 13:25:25
94Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
95IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
96Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
97Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007  Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
98The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
99Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
100Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx  Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35