Intrusion detection system

Results: 338



#Item
141Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 09:24:18
142Shellcode / System software / Application programming interfaces / File descriptor / Standard streams / Exec / Port / System call / Exploit / Computing / Unix / Software

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery AKA: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-14 04:47:49
143Evasion / Application firewall / Security / Computer security / Cyberwarfare / Intrusion detection system

The Challenges of HTTP Intrusion Detection The Challenges of HTTP Intrusion Detection

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
144Science / Mathematics / Logic in computer science / Data mining / Neuro-fuzzy / Intrusion detection system / Fuzzy control system / Association rule learning / Fuzzy classification / Logic / Fuzzy logic / Artificial intelligence

Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 Department of Computer Science, Oklahoma State University, USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2005-02-04 10:21:43
145Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
146Computer network security / Software / Intrusion detection systems / HP Network Management Center / Security information and event management / Network management / System software / Information technology management

DATASHEET InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

Add to Reading List

Source URL: offers.skybotsoftware.com

Language: English - Date: 2015-01-15 14:53:02
147Technology / Computer security / Wireless sensor network / Cyberwarfare / Data security / Anomaly detection / Intrusion detection system / Wireless ad-hoc network / Intrusion prevention system / Wireless networking / Computer network security / Computing

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Add to Reading List

Source URL: titania.ctie.monash.edu.au

Language: English - Date: 2013-05-26 19:08:58
148Internet / Network architecture / Whois / Footprinting / DomainTools.com / Reverse DNS lookup / RIPE / Domain name system / Internet protocols / Computing

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-30 12:44:13
149Pcap / Snort / Thresh / Intrusion detection system / Chroot / Firestorm / Network intrusion detection system / Command & Conquer: Tiberian series / Elog / Software / System software / Computer network security

Firestorm Network Intrusion Detection System John Leach [removed]

Add to Reading List

Source URL: www.scaramanga.co.uk

Language: English - Date: 2004-12-10 21:14:27
150Computing / Data security / Intrusion prevention system / System administration / Intrusion detection system / Evasion / Denial-of-service attack / Internally displaced person / Firewall / Computer network security / Computer security / Cyberwarfare

CHAP TER  1 2 Recognition Strategies: Intrusion Detection and Prevention INFORMATION IN THIS CHAPTER Intrusion detection

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2014-09-02 12:39:05
UPDATE