Intrusion detection system

Results: 338



#Item
71Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
72METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures? Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou Chalmers University of Technology, Gothenburg, Sweden vinmas,almgren,ptri

METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures? Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou Chalmers University of Technology, Gothenburg, Sweden vinmas,almgren,ptri

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:40:32
73Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
74Internet Defense and Detectionindd

Internet Defense and Detectionindd

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:56
75Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:20:35
76Data Sheet  McAfee Network Threat Behavior Analysis Get complete visibility into network behavior and threats.

Data Sheet McAfee Network Threat Behavior Analysis Get complete visibility into network behavior and threats.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-05-05 14:02:43
77Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER  Open Access

Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access

Add to Reading List

Source URL: www.journalofbigdata.com

Language: English
78R Users Manual SNORTThe Snort Project

R Users Manual SNORTThe Snort Project

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-04-24 17:44:05
79COMPUTER SCIENCE RESEARCH PROJECTS 2000 CAREER:Towards Estimating Requirement Coverage: Managing Goals and Scenarios during Requirements Evolution Ana I. Anton

COMPUTER SCIENCE RESEARCH PROJECTS 2000 CAREER:Towards Estimating Requirement Coverage: Managing Goals and Scenarios during Requirements Evolution Ana I. Anton

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2013-12-09 11:41:13
80Battery-Sensing Intrusion Protection for Wireless Handheld Computers using a Dynamic Threshold Calculation Algorithm for Attack Detection

Battery-Sensing Intrusion Protection for Wireless Handheld Computers using a Dynamic Threshold Calculation Algorithm for Attack Detection

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2006-12-19 22:22:36