Network intrusion detection system

Results: 247



#Item
151Software / Anomaly detection / Intrusion detection system / Network intrusion detection system / Bro / Statistical classification / Korea New Network / K-nearest neighbor algorithm / Computer network security / System software / Computer security

DNIDS: A Dependable Network Intrusion Detection System Using the CSI-KNN Algorithm by

Add to Reading List

Source URL: www.collectionscanada.gc.ca

Language: English - Date: 2007-10-26 05:15:31
152Microsoft Windows / Computer network security / Windows Server / Snort / Pcap / Windows / Intrusion detection system / MySQL / Thresh / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 14:12:28
153Microsoft Windows / Computer network security / Windows Server / Snort / Pcap / Windows / Intrusion detection system / MySQL / Thresh / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 16:41:50
154National security / Intrusion detection system / Network intrusion detection system / Computer security / Network security / Physical security / Extrusion detection / Computer network security / Security / Public safety

Mission Control Network Intrusion Detection System How can I protect the assets of my company by identifying attacks before they damage and disrupt business operations? To efficiently protect your confidential data, busi

Add to Reading List

Source URL: www.open.ch

Language: English - Date: 2014-04-25 03:08:19
155Computer security / Intrusion prevention system / Fortinet / Denial-of-service attack / Bypass switch / Intrusion detection system / Evasion / IPS / Network security / Computer network security / Cyberwarfare / Computing

Intrusion Prevention System (IPS) Intrusion Prevention System (IPS) technology protects your network from cybercriminal attacks by actively seeking and blocking external threats before they can reach potentially vulnerab

Add to Reading List

Source URL: docs.fortinet.com

Language: English - Date: 2014-07-17 14:49:56
156Computing / Intrusion detection system / Intrusion prevention system / Firewall / Network intrusion detection system / Denial-of-service attack / Network security / Anomaly detection / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Microsoft Word - IntruPro IPS White Paper1.doc

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:20
157Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:19
158Computing / Telecommuting / Network intrusion detection system / Personal firewall / Intrusion prevention system / Network security / Wireless security / Intrusion detection system / Spyware / Computer network security / Cyberwarfare / Computer security

UNCLASSIFIED COTS SECURITY GUIDANCE (CSG) TELEWORK

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-23 04:42:06
159Computing / Intrusion detection system / Attack / OSSIM / Intrusion detection system evasion techniques / Computer security / Computer network security / Cyberwarfare

Introduction to Intrusion Detection Thomas R. Peltier, CISSP SM Driving eBusiness Performance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
160Anomaly detection / Computer network security / Malware / Anomaly / Denial-of-service attack / Information technology management / Cyberwarfare / Intrusion detection system / Data mining / Statistics / Data security

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 14:55:24
UPDATE