Intrusion detection system

Results: 338



#Item
121Computer vision / Anomaly detection / Intrusion detection system / Misuse detection / Synthetic data / Feature / Receiver operating characteristic / Statistics / Data security / Data mining

Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-08-08 19:37:58
122Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
123Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
124Security / Network security / Zero-day attack / Layered security / Pass the hash / Intrusion prevention system / Password / Malware / Attack / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
125Intrusion detection system / OSSEC / Snort / Intrusion prevention system / NuFW / Alert correlation / System software / Software / Computer network security

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
126Data security / Data analysis / Intrusion detection system / Anomaly / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Anomaly detection

Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-10-22 16:33:27
127Computer security / Intrusion detection system / Petri net / Bro / AAFID / Computer network security / Security / Cyberwarfare

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
128Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
129Computer security / Buffer overflow / Vulnerability / Valgrind / Uncontrolled format string / Intrusion detection system / Cyberwarfare / Software bugs / Computing

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
130Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
UPDATE