Intrusion detection system

Results: 338



#Item
251Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-03-23 12:19:38
252Espionage / Malware / Spyware / Denial-of-service attack / Managed security service / Intrusion prevention system / Norton Internet Security / Computer network security / Cyberwarfare / Computer security

Intrusion Detection Real-time Protection from Known and Unknown Threats. The MegaPath Intrusion Detection service provides real-time detection of network and application attacks by continuously monitoring your network fo

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2014-10-06 18:56:53
253Snort / Software / Computer network security / Intrusion detection system

Intrusion detection and the role of the system administrator [removed] [removed] Swedish Defence Research Agency (FOI)

Add to Reading List

Source URL: www.ifip11-12.org

Language: English - Date: 2012-09-26 06:34:12
254American Association of State Colleges and Universities / Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools / University of Maryland /  Baltimore County / Intrusion detection system / SpamAssassin / Baltimore / Master of Science / Snort / Software / Spam filtering / Spamming

APPROVAL SHEET Title of Thesis: EBIDS-SENLP: A System to Detect Social Engineering Email Using Natural Language Processing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-12 13:40:36
255NetOps / LandWarNet / PM Warfighter Information Network-Tactical

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:26:12
256Spamming / Computing / Association of Commonwealth Universities / University of New Brunswick / Intrusion detection system / Data mining / Botnet / Visualization / Knowledge / Science / Computer network security / Multi-agent systems

RESEARCH Faculty of Computer Science Overview Since 1968, the University of New Brunswick (UNB) has been a key player in the development of computer science in both Canada and the world. In 1990, UNB established the fir

Add to Reading List

Source URL: www.unb.ca

Language: English - Date: 2014-02-06 13:48:59
257Hashing / System software / Search algorithms / Data synchronization / Rsync / MD5 / Hash function / Andrew Tridgell / Rolling hash / Error detection and correction / Computing / Cryptographic hash functions

ManTech International Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:23:00
258Application programming interfaces / C POSIX library / Process / Linux kernel / Kernel / System call / Operating system / Thread / Fork / Computing / Software / System software

User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement K. Jain Iowa State University Ames, IA[removed]removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-11-09 13:16:42
259Denial-of-service attacks / Computer networking / Internet / Network performance / Denial-of-service attack / Reverse proxy / Firewall / LOIC / Intrusion detection system / Computer network security / Computing / Cyberwarfare

Mitigating DoS Attacks using Performance Model-driven Adaptive Algorithms CORNEL BARNA, MARK SHTERN, MICHAEL SMIT, VASSILIOS TZERPOS, MARIN LITOIU, York University Denial of Service (DoS) attacks overwhelm online servic

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-15 15:14:36
260Public safety / Crime prevention / National security / Intrusion detection system / Information security / IT risk / Vulnerability / Physical security / Database security / Security / Data security / Computer security

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
UPDATE