Intrusion detection systems

Results: 104



#Item
81Alarms / Burglar alarm / Warning systems / Intrusion detection system / Submittals / Alarm devices / Annunciator panel / Verification and validation / Tamper resistance / Safety / Security / Prevention

NL Master Specification Guide for Public Funded Buildings Issued[removed] Section[removed] – Intrusion Detection (Form 1) Page 1 of 7 General

Add to Reading List

Source URL: www.tw.gov.nl.ca

Language: English - Date: 2009-11-16 09:27:59
82System call / Ptrace / C standard library / Pointer / Stack / Operating system / Ring / C / Computing / Computer programming / Software engineering

Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Babak Salamat, Todd Jackson, Andreas Gal, and Michael Franz Secure Systems and Languages Laboratory Department of C

Add to Reading List

Source URL: eurosys2009.informatik.uni-erlangen.de

Language: English - Date: 2009-04-19 11:57:08
83Computer security / Session border controller / Deep packet inspection / Firewall / Denial-of-service attack / Intrusion prevention system / Ingate Systems / Stateful firewall / Intrusion detection system / Computer network security / Computing / Cyberwarfare

Newsletter APRIL 21, 2009 Ingate Knowledge Base - a vast resource for information about all things SIP – including security, VoIP, SIP trunking etc. - just for the reseller community. Drill down for more info!

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2009-04-30 05:15:34
84Information technology audit / Audit / Intrusion detection system

Audit and IDS Steve Grubb, Red Hat Linux Audit and Intrusion Detection Systems ● ●

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2008-06-30 09:16:30
85Immune system / Partition function / Anomaly detection / Process / Science / Computing / Management / Multi-agent systems / Intrusion detection system / Agent-based model

LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

Add to Reading List

Source URL: ccl.northwestern.edu

Language: English - Date: 2013-03-28 17:03:17
86Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
87Network architecture / Ad hoc On-Demand Distance Vector Routing / Routing / Network topology / Wireless sensor network / Wireless ad-hoc network / Node / Dynamic Source Routing / Link-state routing protocol / Wireless networking / Technology / Computing

Detecting Critical Nodes for MANET Intrusion Detection Systems A. Karygiannis, E. Antonakakis, and A. Apostolopoulos National Institute of Standards and Technology {karygiannis, manos, aimilios}@nist.gov Abstract Ad hoc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
88MIM-23 Hawk / Wireless networking / Data security / Technology / Prevention / AAFID / Wireless sensor network / Motion detection / Security / Intrusion detection systems

IBDSS Ultimate Surveillance Integration Integrated Base Defense (IBDSS) combines detection and assessment capabilities to provide a real time, complete operational picture for the

Add to Reading List

Source URL: forcepro.ara.com

Language: English - Date: 2014-10-22 15:54:24
89System software / Formal languages / Pattern matching / Intrusion detection systems / Regular expressions / Snort / Network intrusion detection system / TRE / String / Computing / Software / Computer network security

Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

Add to Reading List

Source URL: etd.ncsi.iisc.ernet.in

Language: English - Date: 2014-06-03 01:23:39
90NetOps / LandWarNet / PM Warfighter Information Network-Tactical

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:26:12
UPDATE