Intrusion detection system

Results: 338



#Item
211Biology / Medicine / Autoimmunity / B cell / Antigen / Intrusion detection system / T cell / Virus / Adaptive immune system / Anatomy / Immunology / Immune system

Computer Immunology Stephanie Forresty Steven A. Hofmeyry Anil Somayajiy Dept. of Computer Science University of New Mexico

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 10:52:47
212Computing / Intrusion detection system / Attack / OSSIM / Intrusion detection system evasion techniques / Computer security / Computer network security / Cyberwarfare

Introduction to Intrusion Detection Thomas R. Peltier, CISSP SM Driving eBusiness Performance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
213Statistics / Fuzzy logic / Artificial intelligence / Logic in computer science / Science / Anomaly detection / Intrusion detection system / Misuse detection / Association rule learning / Logic / Data security / Data mining

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
214Computing / Intrusion detection system / TTA / BBN Technologies

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 12:46:23
215Anomaly detection / Computer network security / Malware / Anomaly / Denial-of-service attack / Information technology management / Cyberwarfare / Intrusion detection system / Data mining / Statistics / Data security

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 14:55:24
216Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-03-26 14:41:48
217Computer security / Malware / Whitelist / Intrusion detection system / Internet security / Computer network security / Security / Cyberwarfare

Strategies to Mitigate Targeted Cyber Intrusions - Mitigation Details

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-11-27 23:28:29
218Statistics / Fuzzy logic / Non-classical logic / Mathematics / Intrusion detection system / Anomaly detection / Genetic fuzzy systems / Fuzzy control system / Artificial intelligence / Logic / Logic in computer science

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [removed] Rayford B. Vaughn

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
219Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
220Statistics / Neuroscience / Network architecture / Networks / Computational statistics / Artificial neural network / Cerebellar Model Articulation Controller / Intrusion detection system / Anomaly detection / Neural networks / Computational neuroscience / Cybernetics

Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks James Cannady Georgia Tech Information Security Center Georgia Institute of Technology Atlanta, GA[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE