Intrusion

Results: 1878



#Item
131Computing / Concurrent computing / Computer architecture / Routing algorithms / Distributed data storage / Network architecture / File sharing / Routing protocols / Overlay network / Distributed hash table / Routing / Link-state routing protocol

Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2016-04-28 20:17:25
132Pollution / Chemistry / Water / Atmospheric thermodynamics / Pollutants / Gases / Air pollution / Vapor intrusion / Phase transitions / Water vapor / Groundwater / Evaporation

ATSDR_DIVISIONS_4c_process

Add to Reading List

Source URL: www.atsdr.cdc.gov

Language: English - Date: 2016-04-18 08:08:26
133

Abstract for oral presentation Fault-controlled Igneous Intrusion and its Impacts on Sedimentary Basin and Petroleum System Evolution Craig Magee and Christopher A-L Jackson Department of Earth Science and Engineering, I

Add to Reading List

Source URL: workspace.imperial.ac.uk

Language: English - Date: 2012-12-04 08:57:52
    134

    Efficient Intrusion-Resilient Signatures Without Random Oracles Benoˆıt Libert1 ⋆ , Jean-Jacques Quisquater1 , and Moti Yung2 1 UCL, Microelectronics Laboratory, Crypto Group (Belgium)

    Add to Reading List

    Source URL: perso.uclouvain.be

    Language: English - Date: 2007-02-21 10:22:19
      135Computing / Computer network security / Computer security / Firewall / SonicWall / DMZ / Dell / Intrusion detection system / Exploit

      NGFW Test Report_Dell SonicWALL SuperMassive E10800

      Add to Reading List

      Source URL: i.crn.com

      Language: English - Date: 2016-04-28 09:34:46
      136

      An Introduction To The Physical Characterization of Materials by Mercury Intrusion Porosimetry with Emphasis On Reduction And Presentation of Experimental Data Paul A. Webb Micromeritics Instrument Corp.

      Add to Reading List

      Source URL: www.micromeritics.com

      Language: English - Date: 2016-04-01 01:07:37
        137

        An Introduction To The Physical Characterization of Materials by Mercury Intrusion Porosimetry with Emphasis On Reduction And Presentation of Experimental Data Paul A. Webb Micromeritics Instrument Corp.

        Add to Reading List

        Source URL: www.particletesting.com

        Language: English - Date: 2015-11-05 11:50:35
          138

          Intrusion Detection/Prevention mit Suricata Andreas Herz Open Information Security Foundation

          Add to Reading List

          Source URL: www.speicherleck.de

          Language: German - Date: 2016-04-17 06:05:38
            139Algebra / Mathematics / Multivariate statistics / Principal component analysis / Intrusion detection system / Eigenvalues and eigenvectors / Anomaly detection / Anomaly / Dimensionality reduction

            In-Network PCA and Anomaly Detection Ling Huang UC Berkeley XuanLong Nguyen

            Add to Reading List

            Source URL: dept.stat.lsa.umich.edu

            Language: English - Date: 2006-11-07 02:47:35
            140Malware / Computer network security / Antivirus software / Computer virus / Intrusion detection system / Avira / Malware analysis / Malware research

            SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

            Add to Reading List

            Source URL: hexhive.github.io

            Language: English - Date: 2016-06-13 11:08:40
            UPDATE