Network intrusion detection system

Results: 247



#Item
141Computer network security / Denial-of-service attacks / Computing / Network performance / Artificial neural network / Random neural network / Robust random early detection / Intrusion detection system / Denial-of-service attack / Statistics / Neural networks / Computational neuroscience

A Denial of Service Detector based on Bayesian Classifiers and the Random Neural Network ¨ ∗ and Georgios Loukas G¨ ulay Oke Electrical and Electronic Engineering, Imperial College London, UK

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2007-04-30 15:58:30
142Computer security / Intrusion detection systems / Snort / Network intrusion detection system / Apache HTTP Server / Burglar alarm / Host-based intrusion detection system / Transmission Control Protocol / Prelude Hybrid IDS / Software / System software / Computer network security

Security Information Management b-i branding. technology. integration. www.b-i.com

Add to Reading List

Source URL: www.b-i.com

Language: English - Date: 2014-06-17 04:23:05
143Cyberwarfare / Intrusion detection system / Sourcefire / Intrusion prevention system / Network intrusion detection system / Clone Systems /  Inc. / Snort / Computer network security / System software / Computing

Managed Intrusion Detection Real Time Network Visibility

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2014-02-19 04:12:34
144Cluster analysis / Geostatistics / Machine learning / Anomaly detection / SUBCLU / Outlier / Intrusion detection system / Clustering high-dimensional data / Local outlier factor / Statistics / Data mining / Data analysis

Network Intrusion Detection using a Secure Ranking of Hidden Outliers Marwan Hassani and Thomas Seidl Data Management and Data Exploration Group RWTH Aachen University, Germany {hassani, seidl}@cs.rwth-aachen.de

Add to Reading List

Source URL: dme.rwth-aachen.de

Language: English - Date: 2015-02-10 13:03:28
145Computing / Intrusion prevention system / Firewall / Stateful firewall / Denial-of-service attack / Intrusion detection system / Deep packet inspection / Cracking of wireless networks / Computer network security / Cyberwarfare / Computer security

Microsoft PowerPoint - ICNS2010_AttackEvaluation.ppt [Compatibility

Add to Reading List

Source URL: www.iaria.org

Language: English - Date: 2010-03-23 16:59:14
146Computing / Evasion / Stonesoft Corporation / Campaign for Nuclear Disarmament / Attack / Vulnerability / Network security / Intrusion detection system / Penetration test / Computer network security / Cyberwarfare / Computer security

CND AET (Advanced Evasion) Test Created by: Date: Tel: Website:

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2014-08-15 16:51:06
147Computing / Sguil / Intrusion detection system / Snort / Sourcefire / SFlow / Netflow / Packet capture / Network security / Computer network security / System software / Software

Open Source  Network Security Monitoring With Sguil David J. Bianco President Vorant Network Security, Inc.

Add to Reading List

Source URL: www.vorant.com

Language: English - Date: 2005-08-12 13:58:11
148Security / Intrusion detection system / Advanced persistent threat / Network intrusion detection system / Threat / Zero-day attack / Adversary model / Computer network security / Cyberwarfare / Computer security

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Add to Reading List

Source URL: papers.rohanamin.com

Language: English - Date: 2011-08-10 17:29:42
149Hewlett-Packard / Wireless security / Network management / Networking hardware / System administration / Computing / Computer hardware / Technology

Data sheet HP Mobility Security IDS/IPS System Series Key features • Automatic intrusion threat detection and prevention

Add to Reading List

Source URL: h17007.www1.hp.com

Language: English - Date: 2013-05-09 08:56:46
150Software / Intrusion detection systems / Snort / Evasion / Intrusion detection system / Intrusion detection system evasion techniques / Denial-of-service attack / Buffer overflow / Network intrusion detection system / Computer network security / Cyberwarfare / Computer security

IDS Evasion Techniques and Tactics

Add to Reading List

Source URL: bandwidthco.com

Language: English - Date: 2012-02-12 19:18:28
UPDATE