<--- Back to Details
First PageDocument Content
Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security
Date: 2004-02-27 15:21:35
Computer security
Data security
Crime prevention
National security
Intrusion detection system
Anomaly detection
Honeypot
Vulnerability
Intrusion detection system evasion techniques
Computer network security
Cyberwarfare
Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Download Document from Source Website

File Size: 962,64 KB

Share Document on Facebook

Similar Documents

Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

Machine learning / Artificial neural networks / Learning / Artificial intelligence / Applied mathematics / Unsupervised learning / Anomaly detection / Data mining / Data security / Anomaly / Autoencoder / Feature learning

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Technology / Information and communications technology / Computing / Machine learning / Anomaly detection / Data mining / Data security / Mobile telecommunications / Smartphone / Mobile phone / Anomaly

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document