Intrusion

Results: 1878



#Item
1

PDF Document

Add to Reading List

Source URL: www.intrusion.com

- Date: 2018-03-21 12:17:17
    2

    PDF Document

    Add to Reading List

    Source URL: www.intrusion.com

    - Date: 2018-06-11 10:53:56
      3

      PDF Document

      Add to Reading List

      Source URL: www.intrusion.com

      - Date: 2018-03-21 12:15:41
        4

        PDF Document

        Add to Reading List

        Source URL: www.intrusion.com

        - Date: 2018-03-21 14:21:39
          5Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

          Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

          Add to Reading List

          Source URL: ieee-ssci2018.org

          Language: English - Date: 2018-04-07 06:55:01
            6ALERT LOGIC THREAT MANAGER ® ™  NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

            ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

            Add to Reading List

            Source URL: www.alertlogic.com

            Language: English - Date: 2018-08-16 13:48:55
              7Regular Expression Matching on Graphics Hardware for Intrusion Detection Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Sotiris Ioannidis, Evangelos P. Markatos FORTH-ICS, Greece

              Regular Expression Matching on Graphics Hardware for Intrusion Detection Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Sotiris Ioannidis, Evangelos P. Markatos FORTH-ICS, Greece

              Add to Reading List

              Source URL: www.rennes.supelec.fr

              Language: English - Date: 2009-10-06 07:22:03
                8A Protective Approach to Vapor Intrusion Center for Public Environmental Oversight May 2014 The migration of volatile toxic substances, such as trichloroethylene (TCE), from the soil and shallow groundwater into overlyin

                A Protective Approach to Vapor Intrusion Center for Public Environmental Oversight May 2014 The migration of volatile toxic substances, such as trichloroethylene (TCE), from the soil and shallow groundwater into overlyin

                Add to Reading List

                Source URL: www.cpeo.org

                Language: English - Date: 2017-09-12 16:08:21
                  9Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI)  ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay George W. Dunlap, Samuel T. King, Sukru Cinar, Murta

                  Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI) ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay George W. Dunlap, Samuel T. King, Sukru Cinar, Murta

                  Add to Reading List

                  Source URL: web.eecs.umich.edu

                  Language: English - Date: 2015-12-20 16:58:37
                    10Protecting a Moving Target: Addressing Web Application Concept Drift The 12th International Symposium on Recent Advances in Intrusion DetectionFederico Maggi, William Robertson, Christopher Krügel, Giovanni Vigna

                    Protecting a Moving Target: Addressing Web Application Concept Drift The 12th International Symposium on Recent Advances in Intrusion DetectionFederico Maggi, William Robertson, Christopher Krügel, Giovanni Vigna

                    Add to Reading List

                    Source URL: www.rennes.supelec.fr

                    Language: English - Date: 2009-10-01 10:00:37