Intrusion detection system

Results: 338



#Item
261Electronic engineering / Wireless intrusion prevention system / Aruba Networks / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Service set / Network security / Rogue access point / Wireless networking / Technology / Computing

AirWave RAPIDS Rogue Detection Application Brief AirWave RAPIDS Rogue Detection

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2013-08-14 15:55:27
262Computer security / Intrusion detection system / Network intrusion detection system / Snort / Vern Paxson / Bro / Computer network security / System software / Software

Considerations and Pitfalls for Conducting Intrusion Detection Research Vern Paxson International Computer Science Institute and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-07-18 13:47:40
263Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
264Espionage / Decoy / Intrusion detection system / Deception / Computer security / Counterintelligence / Snort / Attack / Computer network security / Security / Cyberwarfare

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Phase I Report on Intelligent Software Decoys:

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2003-01-02 12:51:46
265Cryptographic protocols / Code signing / X.509 / Computer security / Public key certificate / JAR / Computer virus / Intrusion detection system / Malware / Cryptography / Public-key cryptography / Electronic commerce

The importance of code signing - technical note[removed]

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2011-01-28 13:18:58
266Software / Honeypot / Snort / IP address / Honeyd / Dynamic Host Configuration Protocol / Intrusion detection system / Client honeypot / Computer network security / Computing / System software

Research in Honeypot Technologies Karl Schuttler (E00921961) Eastern Michigan University College of Technology 1. Introduction The proposed research project serves to act as a practical, real-world lab on the use of exi

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:36
267KACE Networks / Remote administration software / System administration / Nursing home / Software / Advanced Intrusion Detection Environment / Health / System software / Healthcare / Configuration management

Kansas Department of Health and Environment Board of Adult Care Home Administrators Meeting of June 11, 2010 The Board of Adult Care Home Administrators met Friday, June 11, 2010 at 1:00 p.m. in Classroom F of the Kansas

Add to Reading List

Source URL: www.kdads.ks.gov

Language: English - Date: 2011-03-29 12:47:16
268Computer security / Intrusion detection system / Snort / Thresh / Alert correlation / Network intrusion detection system / Denial-of-service attack / Evasion / ACARM-ng / Computer network security / System software / Software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2011-09-28 10:25:46
269Computer emergency response team / FlowMon / Computer network security / Computer security / Cisco Security Monitoring /  Analysis /  and Response System / Threat / Intrusion detection system / MU / Request Tracker / Software / Computing / Netflow

CSIRT-MU Jan Vykopal Head of CSIRT-MU Masaryk university Brno, Czech Republic TF-CSIRT meeting – [removed], National Library of Estonia, Tallinn

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2009-09-30 14:50:51
270Security / Vulnerability / Attack / Threat / Countermeasure / Computer emergency response team / Social vulnerability / Intrusion detection system / Cyber security and countermeasure / Computer network security / Cyberwarfare / Computer security

Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2003-03-12 10:44:30
UPDATE