Network intrusion detection system

Results: 247



#Item
231Computer security / Intrusion detection system / Information Assurance Technology Analysis Center / Network intrusion detection system / Intrusion prevention system / Snort / Host-based intrusion detection system / Anomaly detection / Sourcefire / Computer network security / System software / Software

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
232Computing / Honeypot / Network security / Network intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system / Client honeypot / Organizational Systems Security Analyst / Computer network security / Cyberwarfare / Computer security

Product Overview Key Benefits Honeypot based intrusion

Add to Reading List

Source URL: www.keyfocus.net

Language: English - Date: 2003-06-30 08:30:29
233Data security / Computer network security / Anomaly detection / Machine learning / N-gram / Intrusion detection system / Cluster analysis / Metasploit Project / Statistics / Data mining / Computer security

Journal in Computer Virology manuscript No. (will be inserted by the editor)

Add to Reading List

Source URL: eprints.pascal-network.org

Language: English - Date: 2006-11-22 07:08:15
234Computing / Alert correlation / Data mining / Intrusion detection system / Anomaly detection / Snort / ACARM-ng / Computer network security / Software / System software

Managing Alerts in a Multi-Intrusion Detection Environment Frédéric Cuppens ONERA Toulouse

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2001-10-15 21:28:12
235Computer network security / Information technology management / Intrusion detection system / Anomaly detection / Wireless intrusion prevention system / Misuse detection / Intrusion detection system evasion techniques / Intrusion prevention system / Data security / Computer security / Security

ISSN:[removed]Dr Guruprasad Khataniar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), [removed]

Add to Reading List

Source URL: ijcscn.com

Language: English - Date: 2012-08-28 09:07:11
236Data security / Sendmail / Computer network security / Syslog / Daemon / Anomaly detection / Intrusion detection system / Artificial immune system / Email forwarding / Computing / Information technology management / System software

A Sense of Self for Unix Processes Stephanie Forrest Steven A. Hofmeyr

Add to Reading List

Source URL: webpages.math.luc.edu

Language: English - Date: 2008-06-17 14:44:54
237Crime prevention / National security / Data security / Security event manager / Computer network security / Vulnerability / Information security / Intrusion detection system / Security information and event management / Computer security / Security / Cyberwarfare

Information Security Preparing for Security Event Management

Add to Reading List

Source URL: www.windowsecurity.com

Language: English - Date: 2007-02-27 04:40:18
238Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Local outlier factor / Network performance / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection† Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2003-03-21 18:36:29
239Computing / Snort / Thresh / Intrusion detection system / Pcap / Network intrusion detection system / Tcpdump / Packet capture / Firewall / Software / Computer network security / System software

PDF Document

Add to Reading List

Source URL: people.cs.ubc.ca

Language: English - Date: 2004-09-02 20:36:22
240Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Network performance / Local outlier factor / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

PDF Document

Add to Reading List

Source URL: www.siam.org

Language: English - Date: 2008-05-13 10:17:41
UPDATE