Intrusion detection system

Results: 338



#Item
51

Air Force Intrusion Detection System Evaluation Environment Terrence G. Champion Robert S. Durst

Add to Reading List

Source URL: www.raid-symposium.org

Language: English - Date: 2015-03-25 13:07:30
    52Computer security / Cyberwarfare / Computing / Computer network security / Antivirus software / Malware / Lastline / Intrusion detection system / Advanced persistent threat / Rootkit / Duqu / Computer virus

    Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

    Add to Reading List

    Source URL: blog.mrg-effitas.com

    Language: English - Date: 2014-12-03 11:48:39
    53Electronics / Computer network security / Mobile technology / IP Multimedia Subsystem / Multimedia / Telephony / Denial-of-service attack / Intrusion detection system / Internet Relay Chat / Technology / Videotelephony / Electronic engineering

    Visio-DoS_paper_figures.vsd

    Add to Reading List

    Source URL: mcn.cse.psu.edu

    Language: English - Date: 2009-01-20 15:41:05
    54Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

    A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

    Add to Reading List

    Source URL: www.gatsby.ucl.ac.uk

    Language: English - Date: 2006-10-19 19:27:44
    55Computer network security / Intrusion detection systems / OSSEC / Computer security / Daniel B. Cid / Rootkit / Snort / Log analysis / Security log / System software / Software / Computing

    Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

    Add to Reading List

    Source URL: ossec.net

    Language: English - Date: 2012-06-29 13:37:34
    56Computer security / Intrusion detection system / Sguil / Snort / Intrusion prevention system / OSSIM / Suricata / Computer network security / System software / Software

    INTRUSION DETECTION About the Course Knowledge Transfer

    Add to Reading List

    Source URL: www.silensec.com

    Language: English - Date: 2014-04-29 06:18:44
    57Computer security / Data security / Intrusion detection system / Sguil / OSSIM / OSSEC / Security information and event management / System software / Computer network security / Software

    INTRUSION DETECTION About the Course Knowledge Transfer

    Add to Reading List

    Source URL: www.silensec.com

    Language: English - Date: 2014-04-29 06:12:38
    58

    The Human Immune System and Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +, Fax: +

    Add to Reading List

    Source URL: www1.cs.columbia.edu

    - Date: 2004-11-06 17:54:40
      59

      Motivation Potential Solutions Samhain SAMHAIN An open-source Host Intrusion Detection System (HIDS)

      Add to Reading List

      Source URL: www.la-samhna.de

      Language: English - Date: 2011-03-10 08:49:37
        60Crime prevention / National security / Internet privacy / Intrusion detection system / Cyberwarfare / Computer virus / Computer security / Antivirus software / Privacy / Security / Computer network security / Ethics

        Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2002-11-16 13:14:38
        UPDATE