Network intrusion detection system

Results: 247



#Item
31Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-03-22 16:55:00
32Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2013-09-19 13:58:52
33Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
34

Correlation between NetFlow System and Network Views for Intrusion Detection

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2004-05-17 14:02:11
    35Software / Computing / System software / Network management / Internet Standards / Internet protocols / System administration / Intrusion detection systems / Syslog / Event correlation / Logfile / Eval

    Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi

    Add to Reading List

    Source URL: ristov.github.io

    Language: English - Date: 2016-03-01 13:52:01
    36Avionics / Computer network security / Computing / Security / Cyberwarfare / Air traffic control / Automatic dependent surveillance  broadcast / Intrusion detection system / Traffic collision avoidance system / Secondary surveillance radar / ADS / Computer security

    Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2015-08-08 10:32:39
    37Computer network security / Global Information Assurance Certification / SANS Institute / Computer security / Intrusion detection system

    The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2015-08-20 16:00:38
    38Computer network security / Computing / Computer security / Cyberwarfare / Firewall / Intrusion detection system / Outline of computer security / Wireless security

    Invensys White Paper is now

    Add to Reading List

    Source URL: iom.invensys.com

    Language: English - Date: 2015-05-08 05:42:47
    39Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

    Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:02
    UPDATE