Intrusion

Results: 1878



#Item
151Cyberwarfare / Secure communication / Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Tor / Proxy server / Computer security / Draft:Energy related security attacks / Intrusion detection system evasion techniques

Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech Report

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2015-10-29 15:50:00
152

Personal Security Personnel screening, Segregation of duties, Confidentiality and appropriate use agreements System Monitoring and Control System hardening, threat detection, intrusion prevention, network/system logging,

Add to Reading List

Source URL: www.vascan.org

- Date: 2007-08-21 14:03:33
    153Social networking services / Customer experience management / Customer relationship management / E-commerce / Marketing / Facebook / Twitter

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich MIT CSAIL

    Add to Reading List

    Source URL: sigops.org

    Language: English - Date: 2014-02-27 16:46:07
    154

    Intrusion Detection: A Bioinformatics Approach Scott Coull1 1 Joel Branch1

    Add to Reading List

    Source URL: www.scottcoull.com

    Language: English - Date: 2014-03-03 12:03:03
      155Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

      OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

      Add to Reading List

      Source URL: www.di.fc.ul.pt

      Language: English - Date: 2011-04-15 13:02:34
      156

      Signature Based Intrusion Detection using Latent Semantic Analysis Jean-Louis Lassez, Ryan Rossi, Stephen Sheel, and Srinivas Mukkamala Abstract We address the problem of selecting and extracting key features by using si

      Add to Reading List

      Source URL: www.ryanrossi.com

      Language: English - Date: 2012-03-02 07:08:35
        157

        Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems ∗ †

        Add to Reading List

        Source URL: aronlaszka.com

        Language: English - Date: 2015-08-30 01:31:31
          158Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

          SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

          Add to Reading List

          Source URL: www.di.fc.ul.pt

          Language: English - Date: 2013-01-18 09:24:08
          159Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

          BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2007-05-15 01:33:26
          160

          Application of Mercury Intrusion Porosimetry in Pore Structure Characterization; #)

          Add to Reading List

          Source URL: www.searchanddiscovery.com

          Language: English - Date: 2012-06-11 10:53:57
            UPDATE