Intrusion detection system

Results: 338



#Item
231Computer security / Session border controller / Deep packet inspection / Firewall / Denial-of-service attack / Intrusion prevention system / Ingate Systems / Stateful firewall / Intrusion detection system / Computer network security / Computing / Cyberwarfare

Newsletter APRIL 21, 2009 Ingate Knowledge Base - a vast resource for information about all things SIP – including security, VoIP, SIP trunking etc. - just for the reseller community. Drill down for more info!

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2009-04-30 05:15:34
232Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:38:16
233Information technology audit / Audit / Intrusion detection system

Audit and IDS Steve Grubb, Red Hat Linux Audit and Intrusion Detection Systems ● ●

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2008-06-30 09:16:30
234Immune system / Partition function / Anomaly detection / Process / Science / Computing / Management / Multi-agent systems / Intrusion detection system / Agent-based model

LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

Add to Reading List

Source URL: ccl.northwestern.edu

Language: English - Date: 2013-03-28 17:03:17
235Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
236Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
237Cyberwarfare / Security / Computer networking / Application firewall / Network performance / Firewall / Denial-of-service attack / Intrusion detection system / Proxy server / Computer network security / Computing / Computer security

UNCLASSIFIED Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz

Add to Reading List

Source URL: www.afcea.org

Language: English - Date: 2014-05-15 14:13:06
238Detectors / Active fire protection / Smoke detector / Intrusion detection system / Safety / Security / Alarms

PDF Document

Add to Reading List

Source URL: www.tmaidaho.com

Language: English - Date: 2011-04-30 11:49:23
239Computing / Iptables / Snort / Netfilter / Intrusion detection system / Firewall / Thresh / Pcap / Port knocking / Software / System software / Computer network security

fire_03.book Page 291 Monday, August 27, 2007 3:54 PM INDEX A ALERTING_METHODS variable, in psad.conf

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
240Multi-monitor / Intrusion detection system / Log monitor / Operating system / Information technology management / Computing / Audio engineering / Technology / Runtime verification / System administration / Display technology / Input/output

Detection of Intrusion Across Multiple Sensors William Long*a, Jon Doyleb, Glenn Burkea, and Peter Szolovitsa aLaboratory for Computer Science, Mass. Inst. Of Technology; bDept. of Computer Science, North Carolina State

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2003-04-17 13:36:44
UPDATE