Intrusion detection system

Results: 338



#Item
221Cybernetics / Self-organizing map / Anomaly detection / Supervised learning / Intrusion detection system / Feature / Learning Vector Quantization / Hybrid Kohonen SOM / Neural networks / Statistics / Machine learning

Multiple Self-Organizing Maps for Intrusion Detection Brandon Craig Rhodes, James A. Mahaffey, James D. Cannady fbrandon.rhodes,jim.mahaffey,[removed] Computer Science and Information Technology Div

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
222Biology / Medicine / Autoimmunity / B cell / Antigen / Intrusion detection system / T cell / Virus / Adaptive immune system / Anatomy / Immunology / Immune system

Computer Immunology Stephanie Forresty Steven A. Hofmeyry Anil Somayajiy Dept. of Computer Science University of New Mexico

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 10:52:47
223Crime prevention / Security engineering / Computer network security / NICE Systems / Closed-circuit television / Digital video recorder / Intrusion detection system / Computer security / Surveillance / Security / National security / Public safety

NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

Add to Reading List

Source URL: www.voiceproducts.com

Language: English - Date: 2012-02-16 13:09:02
224Cyberwarfare / Crime prevention / National security / Data security / Managed Trusted Internet Protocol Service / Intrusion prevention system / Intrusion detection system / Information security / Attack / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2013-11-06 08:55:09
225Software / Intrusion detection system / Serialization / Snort / Network intrusion detection system / Bro / Database / Communications protocol / Packet Processing / Computer network security / System software / Computing

TUM ¨ R INFORMATIK INSTITUT FU Exploiting Independent State For Network Intrusion Detection

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-10 17:58:10
226Alarms / Burglar alarm / Warning systems / Intrusion detection system / Submittals / Alarm devices / Annunciator panel / Verification and validation / Tamper resistance / Safety / Security / Prevention

NL Master Specification Guide for Public Funded Buildings Issued[removed] Section[removed] – Intrusion Detection (Form 1) Page 1 of 7 General

Add to Reading List

Source URL: www.tw.gov.nl.ca

Language: English - Date: 2009-11-16 09:27:59
227System call / Ptrace / C standard library / Pointer / Stack / Operating system / Ring / C / Computing / Computer programming / Software engineering

Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Babak Salamat, Todd Jackson, Andreas Gal, and Michael Franz Secure Systems and Languages Laboratory Department of C

Add to Reading List

Source URL: eurosys2009.informatik.uni-erlangen.de

Language: English - Date: 2009-04-19 11:57:08
228Alarms / Burglar alarm / Electrical wiring / Cables / Fire alarm control panel / Fire alarm system / Access control / Electrical conduit / Central station / Safety / Security / Prevention

NL Master Specification Guide for Public Funded Buildings Issued[removed] Section[removed] – Intrusion Detection (Form 2) Page 1 of 4 GENERAL

Add to Reading List

Source URL: www.tw.gov.nl.ca

Language: English - Date: 2014-12-02 09:26:14
229Cyberwarfare / Crime prevention / National security / Secure communication / Intrusion detection system / Information assurance / DARPA / Attack / Anomaly detection / Computer security / Security / Computer network security

Information Assurance & Survivability Brian Witten 1

Add to Reading List

Source URL: archive.darpa.mil

Language: English - Date: 2000-10-06 09:16:55
230Computing / Intrusion detection system / Mobile agent / Software agent / Denial-of-service attack / AAFID / Intrusion detection system evasion techniques / Computer network security / Computer security / Cyberwarfare

INTRUSION DETECTION WITH MOBILE AGENTS Wayne A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 (+[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE