Network intrusion detection system

Results: 247



#Item
11Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
12Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
13Software / Computing / Computer security / Computer network security / Cyberwarfare / Cloud computing / Cloud storage / OwnCloud / Application firewall / Fail2ban / Intrusion detection system / Denial-of-service attack

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
14Wireless networking / Wireless ad hoc network / Routing / Wireless mesh network / Artificial immune system / Intrusion detection system / Immune system / Peer-to-peer

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-13 10:13:02
15Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition

Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:31
16Computer network security / Cyberwarfare / Computer security / Cybercrime / Secure communication / Password / Intrusion detection system / Malware

Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:23
17Wireless networking / Mobile ad hoc network / Wireless ad hoc network / Mesh networking / Wireless intrusion prevention system / Vehicular ad hoc network / Wireless sensor network / Zone Routing Protocol / Manet / Intrusion detection system / Wireless LAN / Sensor node

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-03 07:52:04
18Computer security / Computer network security / Data security / Cryptography / National security / Information security operations center / Information security / Payment Card Industry Data Security Standard / Security information and event management / Intrusion detection system / Security / Threat

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
19Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
20Computing / Computer network security / Computer security / Firewall / SonicWall / DMZ / Dell / Intrusion detection system / Exploit

NGFW Test Report_Dell SonicWALL SuperMassive E10800

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-28 09:34:46
UPDATE