Intrusion detection system

Results: 338



#Item
181Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
182Traffic flow / Denial-of-service attack / Anomaly detection / Transmission Control Protocol / OSI protocols / Computer network security / Computing / Intrusion detection system

Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Add to Reading List

Source URL: netvue.cs.arizona.edu

Language: English - Date: 2014-10-16 13:25:04
183Cyberwarfare / Software testing / Credit cards / Computer network security / Automated teller machine / Payment Card Industry Data Security Standard / Intrusion detection system / Host-based intrusion detection system / Penetration test / Computer security / Payment systems / Technology

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
184Software / Denial-of-service attack / Snort / Intrusion detection system / Computer network security / Cyberwarfare / Computer security

THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2006-11-15 03:11:14
185Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
186Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 14:44:03
187Computational statistics / Artificial intelligence / C4.5 algorithm / ID3 algorithm / Association rule learning / ReD / Intrusion detection system / Ross Quinlan / Data Analysis Techniques for Fraud Detection / Machine learning / Decision trees / Data mining

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 10:21:44
188Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
189Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
190Security / Intrusion detection system / OWASP / Application security / Vulnerability / Snort / Evasion / Attack / Computer security / Cyberwarfare / Computer network security

OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:50:03
UPDATE