Intrusion detection system

Results: 338



#Item
131Cyberwarfare / Intrusion detection system / Bro / Computer network security / Security / Computer security

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35
132Data management / Parallel computing / Database / Database theory / Cloud computing / Workflow / Intrusion detection system / HPCC / Azure Services Platform / Computing / Concurrent computing / Workflow technology

Minimizing Cost when using Globally Distributed Cloud Services: A Case Study in Analysis of Intrusion Detection Workflow Application Suraj Pandey1, Kapil Kumar Gupta1 , Adam Barker2 , Rajkumar Buyya1 1 The Cloud Computi

Add to Reading List

Source URL: www.cloudbus.org

Language: English - Date: 2009-08-29 07:12:44
133Alarms / Burglar alarm / Access control / Intrusion detection system / Robert Bosch GmbH / Security / Safety / Computer security

Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Add to Reading List

Source URL: www.milestonesys.com

Language: English - Date: 2015-01-05 10:29:44
134Computer network security / Data security / Intrusion detection systems / OSSEC / Internet privacy / Suricata / Information security / Information Systems Security Association / Tor / System software / Software / Computer security

toolsmith ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2011-05-02 15:02:44
135Statistics / Computer security / Data mining / Denial-of-service attack / Genetic programming / Anomaly detection / Anomaly-based intrusion detection system / Computer network security / Intrusion detection system / Cyberwarfare

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2006-12-26 09:46:58
136Routing / BackTrack / KDE / Ifconfig / Computer network security / Internet standards / Penetration test / Dynamic Host Configuration Protocol / Network service / Computing / System software / Software

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-22 19:34:56
137Computer networking / Network performance / Domain name system / Internet privacy / Proxy server / Server / Name server / Directory service / Microsoft Servers / Computing / System software / Internet

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-03 19:27:50
138Computer network security / Computing / Cyberwarfare / Intrusion detection system / Anomaly detection / John Vincent Atanasoff / Whitelist / Computer security / Security / Data mining

COLLOQUIA LECTURE HARRIS LIN Thursday, April 16, 2015 3:40 p.m. 223 Atanasoff Hall

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-04-09 11:00:52
139Computer network security / Port scanner / Nmap / Computer security / Traceroute / Ping / Transmission Control Protocol / Cracking of wireless networks / Paping / Software / System software / Computing

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-06 20:00:57
140Cyberwarfare / Local area networks / Computer security / DMZ / OSSIM / Intrusion detection system / Firewall / Virtual LAN / Security information and event management / Computer network security / Data security / Computing

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-04 04:12:49
UPDATE