<--- Back to Details
First PageDocument Content
Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software
Date: 2013-08-01 09:17:33
Security
Intrusion detection system
Anomaly detection
Anomaly-based intrusion detection system
Snort
Network intrusion detection system
Burglar alarm
Network security
Malware
Computer network security
System software
Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Download Document from Source Website

File Size: 682,92 KB

Share Document on Facebook

Similar Documents

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

DocID: 11S4q - View Document

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

DocID: 11fWL - View Document

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

DocID: ZIbl - View Document

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

DocID: YOuu - View Document

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

DocID: RK8t - View Document