Intrusion detection systems

Results: 104



#Item
41Intrusion detection systems / OSSEC / Rootkit / Installation / Linux distribution / SYS / Linux / Berkeley Software Distribution / System software / Software / Computer network security

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
42Computer security / Cyberwarfare / Computing / Computer network security / Data security / Intrusion detection systems

Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
43Multi-agent systems / Automated planning and scheduling / Reasoning system / Procedural reasoning system / Hierarchical task network / Planning / Artificial intelligence / Cognitive architecture / Problem solving

Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Add to Reading List

Source URL: rpgoldman.goldman-tribe.org

Language: English - Date: 2009-08-06 12:04:58
44Intrusion detection system / Computing / Cyberwarfare / Antivirus software / Malware / Microsoft Security Essentials

Systems Security Research at POLIMI Federico Maggi Stefano Zanero 2

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:22:30
45Computing / Suricata / Intrusion detection system / Ubuntu / Firewall / Malware / Debian / Intrusion prevention system / Snort / Software / Computer network security / System software

COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

Add to Reading List

Source URL: www.countersnipe.com

Language: English - Date: 2014-11-25 12:45:19
46Intrusion detection system / OSSEC / Snort / Intrusion prevention system / NuFW / Alert correlation / System software / Software / Computer network security

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
47Computer security / Intrusion detection system / Petri net / Bro / AAFID / Computer network security / Security / Cyberwarfare

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
48Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
49Cyberwarfare / Intrusion detection system / Bro / Computer network security / Security / Computer security

Int. J. Accounting, Auditing and Performance Evaluation, Vol. x, No. x, xxxx Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-05-31 02:13:35
50Alarms / Burglar alarm / Access control / Intrusion detection system / Robert Bosch GmbH / Security / Safety / Computer security

Integrated Access Control Solution Bosch Security Systems and Milestone Systems Solution summary ▶▶ XProtect® supports Bosch Access Professional Edition (APE) 3.0 or newer

Add to Reading List

Source URL: www.milestonesys.com

Language: English - Date: 2015-01-05 10:29:44
UPDATE