Intrusion detection systems

Results: 104



#Item
11

Microsoft Word - Intrusion Detection Systems as Evidence.doc

Add to Reading List

Source URL: www.pmsommer.com

Language: English - Date: 2013-08-25 05:48:58
    12

    Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems ∗ †

    Add to Reading List

    Source URL: aronlaszka.com

    Language: English - Date: 2015-08-30 01:31:31
      13Computing / System software / Software / Internet Standards / Intrusion detection systems / Bro / System administration / Network management / Internet protocols / Syslog / NetFlow / Dynamic Host Configuration Protocol

      The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin

      Add to Reading List

      Source URL: www.troopers.de

      Language: English - Date: 2014-12-14 12:00:01
      14Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

      Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

      Add to Reading List

      Source URL: home.regit.org

      Language: English - Date: 2015-10-01 09:35:59
      15

      Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter, Eckehard Hermann, Markus Zeilinger Department of Secure Information Systems Upper Austria University of App

      Add to Reading List

      Source URL: nymity.ch

      Language: English - Date: 2015-12-06 00:57:12
        16Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

        Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

        Add to Reading List

        Source URL: home.regit.org

        Language: English - Date: 2013-09-19 13:58:52
        17

        A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1, Wenke Lee2, David Schimmel1, Didier Contis1, Mohamed Koné2, Ashley Thomas2 Center for Experimental Research in Computer Systems (CERCS) Ge

        Add to Reading List

        Source URL: wenke.gtisc.gatech.edu

        Language: English - Date: 2011-08-22 15:12:58
          18Software / Computing / System software / Network management / Internet Standards / Internet protocols / System administration / Intrusion detection systems / Syslog / Event correlation / Logfile / Eval

          Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi

          Add to Reading List

          Source URL: ristov.github.io

          Language: English - Date: 2016-03-01 13:52:01
          19

          Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

          Add to Reading List

          Source URL: wenke.gtisc.gatech.edu

          Language: English - Date: 2011-08-22 15:12:58
            20Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

            Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

            Add to Reading List

            Source URL: www1.icsi.berkeley.edu

            Language: English - Date: 2012-09-26 16:43:02
            UPDATE