Network intrusion detection system

Results: 247



#Item
21Algebra / Mathematics / Multivariate statistics / Principal component analysis / Intrusion detection system / Eigenvalues and eigenvectors / Anomaly detection / Anomaly / Dimensionality reduction

In-Network PCA and Anomaly Detection Ling Huang UC Berkeley XuanLong Nguyen

Add to Reading List

Source URL: dept.stat.lsa.umich.edu

Language: English - Date: 2006-11-07 02:47:35
22Malware / Computer network security / Antivirus software / Computer virus / Intrusion detection system / Avira / Malware analysis / Malware research

SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
23

Personal Security Personnel screening, Segregation of duties, Confidentiality and appropriate use agreements System Monitoring and Control System hardening, threat detection, intrusion prevention, network/system logging,

Add to Reading List

Source URL: www.vascan.org

- Date: 2007-08-21 14:03:33
    24Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2007-05-15 01:33:26
    25Computing / System software / Software / Internet Standards / Intrusion detection systems / Bro / System administration / Network management / Internet protocols / Syslog / NetFlow / Dynamic Host Configuration Protocol

    The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin

    Add to Reading List

    Source URL: www.troopers.de

    Language: English - Date: 2014-12-14 12:00:01
    26Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

    Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

    Add to Reading List

    Source URL: home.regit.org

    Language: English - Date: 2015-10-01 09:35:59
    27Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

    JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2014-03-28 12:39:15
    28Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

    Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:07
    29Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

    MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2014-12-01 17:07:32
    30Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

    Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:10
    UPDATE