Network intrusion detection system

Results: 247



#Item
181System software / Formal languages / Pattern matching / Intrusion detection systems / Regular expressions / Snort / Network intrusion detection system / TRE / String / Computing / Software / Computer network security

Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

Add to Reading List

Source URL: etd.ncsi.iisc.ernet.in

Language: English - Date: 2014-06-03 01:23:39
182Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-03-23 12:19:38
183Espionage / Malware / Spyware / Denial-of-service attack / Managed security service / Intrusion prevention system / Norton Internet Security / Computer network security / Cyberwarfare / Computer security

Intrusion Detection Real-time Protection from Known and Unknown Threats. The MegaPath Intrusion Detection service provides real-time detection of network and application attacks by continuously monitoring your network fo

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2014-10-06 18:56:53
184Snort / Software / Computer network security / Intrusion detection system

Intrusion detection and the role of the system administrator [removed] [removed] Swedish Defence Research Agency (FOI)

Add to Reading List

Source URL: www.ifip11-12.org

Language: English - Date: 2012-09-26 06:34:12
185NetOps / LandWarNet / PM Warfighter Information Network-Tactical

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:26:12
186Spamming / Computing / Association of Commonwealth Universities / University of New Brunswick / Intrusion detection system / Data mining / Botnet / Visualization / Knowledge / Science / Computer network security / Multi-agent systems

RESEARCH Faculty of Computer Science Overview Since 1968, the University of New Brunswick (UNB) has been a key player in the development of computer science in both Canada and the world. In 1990, UNB established the fir

Add to Reading List

Source URL: www.unb.ca

Language: English - Date: 2014-02-06 13:48:59
187Denial-of-service attacks / Computer networking / Internet / Network performance / Denial-of-service attack / Reverse proxy / Firewall / LOIC / Intrusion detection system / Computer network security / Computing / Cyberwarfare

Mitigating DoS Attacks using Performance Model-driven Adaptive Algorithms CORNEL BARNA, MARK SHTERN, MICHAEL SMIT, VASSILIOS TZERPOS, MARIN LITOIU, York University Denial of Service (DoS) attacks overwhelm online servic

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-15 15:14:36
188Electronic engineering / Wireless intrusion prevention system / Aruba Networks / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Service set / Network security / Rogue access point / Wireless networking / Technology / Computing

AirWave RAPIDS Rogue Detection Application Brief AirWave RAPIDS Rogue Detection

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2013-08-14 15:55:27
189Computer security / Intrusion detection system / Network intrusion detection system / Snort / Vern Paxson / Bro / Computer network security / System software / Software

Considerations and Pitfalls for Conducting Intrusion Detection Research Vern Paxson International Computer Science Institute and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-07-18 13:47:40
190Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
UPDATE