Intrusion detection systems

Results: 104



#Item
51Computer network security / Data security / Intrusion detection systems / OSSEC / Internet privacy / Suricata / Information security / Information Systems Security Association / Tor / System software / Software / Computer security

toolsmith ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2011-05-02 15:02:44
52Science / Mathematics / Logic in computer science / Data mining / Neuro-fuzzy / Intrusion detection system / Fuzzy control system / Association rule learning / Fuzzy classification / Logic / Fuzzy logic / Artificial intelligence

Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 Department of Computer Science, Oklahoma State University, USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2005-02-04 10:21:43
53Computer network security / Software / Intrusion detection systems / HP Network Management Center / Security information and event management / Network management / System software / Information technology management

DATASHEET InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

Add to Reading List

Source URL: offers.skybotsoftware.com

Language: English - Date: 2015-01-15 14:53:02
54Transmission Control Protocol / Replication / Computer architecture / Network protocols / Fault-tolerant computer systems / Data synchronization / Computing

ByzID: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan Karl Levitt Hein Meling Sean Peisert Haibin Zhang

Add to Reading List

Source URL: www.ux.uis.no

Language: English - Date: 2014-11-29 05:01:28
55Alarms / Burglar alarm / Motion detector / Motion detection / Infrared / Security / Safety / Prevention

Intrusion Systems | UP 370 T LSN Matchtec Detector, Antimask UP 370 T LSN Matchtec Detector, Antimask ▶ Linking of passive infrared and ultrasound systems ▶ Range of 6–10 m ▶ Temperature compensation

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-12-10 02:01:10
56

I tre obiettivi della sicurezza • Confidenzialità: solo le persone autorizzate possono accedere al sistema informativo Intrusion Detection Systems Intrusione, controllo e contenimento nel digital warfare

Add to Reading List

Source URL: www.s0ftpj.org

Language: Italian - Date: 2005-08-21 17:33:38
    57Alarms / Burglar alarm / Relay / Photoelectric effect / Safety / Electromagnetism / Security

    Intrusion Systems | DS453Q and DS455Q Quad Beam Photoelectric Detectors DS453Q and DS455Q Quad Beam Photoelectric Detectors ▶ Quad beam detection ▶ Four mounting options using optional mounting poles

    Add to Reading List

    Source URL: us.sourcesecurity.com

    Language: English - Date: 2010-01-08 04:06:18
    58Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

    The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

    Add to Reading List

    Source URL: www.cs.iastate.edu

    Language: English - Date: 2005-02-05 20:56:16
    59Measurement / Data / Information / Application protocol-based intrusion detection system / Transmission Control Protocol / Communications protocol / Space Communications Protocol Specifications / CCSDS / Committees / Consultative Committee for Space Data Systems

    Microsoft Word - Corrigendum 2_final.doc

    Add to Reading List

    Source URL: public.ccsds.org

    Language: English - Date: 2014-05-01 13:08:54
    60Computer network security / Data security / Anomaly detection / Intrusion detection system / Cluster analysis / Peer-to-peer / Traffic classification / Network security / SFlow / Statistics / Data mining / Data analysis

    3-2 D  ata Mining over Network Streams BAN Tao and KADOBAYASHI Youki Network monitoring and analyzing systems (NMASes) have been playing an active roll for preventing cyber attacks and providing practical and proactive

    Add to Reading List

    Source URL: www.nict.go.jp

    Language: English - Date: 2013-11-21 21:05:58
    UPDATE