Intrusion detection system

Results: 338



#Item
151

IDS – Intrusion Detection System IDS Intrusion Detection System

Add to Reading List

Source URL: www.domhan.de

Language: German - Date: 2005-01-16 13:27:53
    152Cyberwarfare / Alert correlation / Reason maintenance / Intrusion detection system / Thresh / Vulnerability / ACARM-ng / Computer security / Computer network security / Computing

    Improvements in Security Alert Analysis with a Truth Maintenance System

    Add to Reading List

    Source URL: www.hicss.hawaii.edu

    Language: English - Date: 2007-11-29 01:14:03
    153Computer security / Intrusion detection system / Snort / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / Software / System software

    EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

    Add to Reading List

    Source URL: www.cs.virginia.edu

    Language: English - Date: 2002-07-23 16:30:01
    154Evaluation / Secure communication / Data security / Action / Common Criteria / Protection Profile / Security Target / AirMagnet / Evaluation Assurance Level / Security / Computer security / Computer network security

    Intrusion Detection System Sensor Protection Profile

    Add to Reading List

    Source URL: sertit.no

    Language: English - Date: 2013-09-19 06:43:38
    155Cyberwarfare / Computing / Anomaly detection / Data mining / Intrusion detection system / Misuse detection / Anomaly-based intrusion detection system / Bro / Intrusion detection system evasion techniques / Computer network security / Computer security / Data security

    Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

    Add to Reading List

    Source URL: www.s0ftpj.org

    Language: English - Date: 2006-07-14 18:58:00
    156Wavelet / Computer science / Network intrusion detection system / Cyberwarfare / Computer security / Computer Science and Engineering / Computer / Computer network security / Security / Intrusion detection system

    Fates: A Peicewise view of Networks

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-13 12:13:20
    157Computer security / Intrusion detection system / Anomaly detection / Misuse detection / Burglar alarm / Intrusion detection system evasion techniques / OSSIM / Security / Data security / Computer network security

    Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Detecting 0-day attacks with

    Add to Reading List

    Source URL: www.s0ftpj.org

    Language: English - Date: 2007-01-25 16:48:54
    158System software / Cyberwarfare / Intrusion detection system / Intrusion prevention system / Evasion / Snort / Network performance / Type I and type II errors / Throughput / Computer network security / Computer security / Computing

    IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

    Add to Reading List

    Source URL: www.getadvanced.net

    Language: English - Date: 2013-04-16 08:43:37
    159Security / Data security / Hacking / Secure communication / Intrusion detection system / Vulnerability / Network security / Attack / Anomaly detection / Cyberwarfare / Computer security / Computer network security

    Deploying Statistical Anomaly Detection to Improve Cyber Security: Strategy, Benefits, and Results Dr. Greg Shannon, Chief Scientist, CounterStorm, Inc. There will always be new vulnerabilities in the information network

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-11 16:57:20
    160Computer security / Information technology management / Information / Local outlier factor / Intrusion detection system / Synthetic data / Threat / Association rule learning / Data Analysis Techniques for Fraud Detection / Data mining / Statistics / Data management

    Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-11 08:59:10
    UPDATE