Computer network

Results: 31604



#Item
71

(IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:00
    72

    RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage Antonis Papadogiannakis,* Michalis Polychronakis,† and Evangelos P. Markatos* * Institute of Computer Science, Foundation for Research and Tec

    Add to Reading List

    Source URL: www.ics.forth.gr

    - Date: 2012-03-22 09:28:01
      73

      Network of the Day: Interactive Visualization of Time-Dependent Entity Relation Networks from Online Sources U. Fahrer, D. Benikova, A. Gabriel, M. Kaufmann, S. M. Yimam, T. von Landesberger, and C. Biemann Computer Scie

      Add to Reading List

      Source URL: www.gris.tu-darmstadt.de

      - Date: 2014-10-27 12:57:15
        74

        Securing the Software-Defined Network Control Layer Phillip Porras, Steven Cheung, Martin Fong, Keith Skinner, and Vinod Yegneswaran Computer Science Laboratory, SRI International 333 Ravenswood Avenue, Menlo Park, CA 94

        Add to Reading List

        Source URL: www.csl.sri.com

        - Date: 2014-12-07 16:47:18
          75

          Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

          Add to Reading List

          Source URL: www.ics.forth.gr

          - Date: 2012-03-22 09:28:01
            76

            Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation

            Add to Reading List

            Source URL: www.ics.forth.gr

            - Date: 2012-03-22 09:27:59
              77

              Anomalous Payload-based Network Intrusion Detection Ke Wang, Salvatore J. Stolfo Computer Science Department, Columbia University 500 West 120th Street, New York, NY, 10027 {kewang, sal}@cs.columbia.edu

              Add to Reading List

              Source URL: cs.fit.edu

              - Date: 2004-07-14 14:20:58
                78

                Improving the Performance of Passive Network Monitoring Applications using Locality Buffering Antonis Papadogiannakis, Demetres Antoniades, Michalis Polychronakis, and Evangelos P. Markatos Institute of Computer Science

                Add to Reading List

                Source URL: www.ics.forth.gr

                - Date: 2012-03-22 09:27:59
                  79

                  IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 18, NO. 3, MAYReal-Time Neural Network Inversion on the SRC-6e Reconfigurable Computer

                  Add to Reading List

                  Source URL: marksmannet.com

                    80

                    Computer and Network Use Policy and Procedures

                    Add to Reading List

                    Source URL: www.sjeccd.edu

                    - Date: 2014-02-18 13:30:34
                      UPDATE