Intrusion detection system

Results: 338



#Item
241Technology / SCADA / Computer security / Network security / Internet security / Attack / Malware / Intrusion detection system / Computer network security / Security / Cyberwarfare

CS&IIR Workshop 2006 Overview and Agenda The actual schedule is slightly modified from the times indicated below as follows. Wednesday’s Keynote has been moved to the first talk after lunch. All presenters up to that t

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2006-05-09 23:15:32
242KACE Networks / Remote administration software / System administration / Nursing home / Software / Advanced Intrusion Detection Environment / Health / System software / Healthcare / Configuration management

Kansas Department of Health and Environment Board of Adult Care Home Administrators Meeting of June 11, 2010 The Board of Adult Care Home Administrators met Friday, June 11, 2010 at 1:00 p.m. in Classroom F of the Kansas

Add to Reading List

Source URL: www.kdads.ks.gov

Language: English - Date: 2011-03-29 12:47:16
243Anomaly detection / Statistics / Transmission Control Protocol / Computing / Denial-of-service attack / Anomaly / Data / Computer network security / Denial-of-service attacks / Intrusion detection system

Evaluation of an Online Parallel Anomaly Detection System Shashank Shanbhag and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA 01003–9284

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:26
244Benchmark / Algorithm / Mathematics / Data mining / Anomaly / Intrusion detection system

AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection Shashank Shanbhag and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA {sshanbha,wolf}@ecs.uma

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:27
245Cyberwarfare / Crime prevention / National security / Data security / Managed Trusted Internet Protocol Service / Intrusion prevention system / Intrusion detection system / Information security / Attack / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2013-11-06 08:55:09
246Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
247Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-09-11 12:46:40
248Ethics / Underwriters Laboratories / Safety / Intrusion detection system / Government / United States government secrecy / Information Security Oversight Office / National Archives and Records Administration

ISOO Notice[removed]: Additional Guidance on Supplemental Controls Required for Safeguarding Classified National Security Information The purpose of this Notice is to provide additional guidance on the safeguarding of cla

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2012-04-03 10:35:19
249National security / MIM-23 Hawk / Surveillance / Security / Crime prevention / Public safety

RAPID™ Surveillance Made Mobile The RAPID system is a cost-effective, mobile, and highly capable solution for wide area intrusion detection. The universal radar

Add to Reading List

Source URL: forcepro.ara.com

Language: English - Date: 2014-10-22 15:54:26
250System software / Formal languages / Pattern matching / Intrusion detection systems / Regular expressions / Snort / Network intrusion detection system / TRE / String / Computing / Software / Computer network security

Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

Add to Reading List

Source URL: etd.ncsi.iisc.ernet.in

Language: English - Date: 2014-06-03 01:23:39
UPDATE