Intrusion

Results: 1878



#Item
161

Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks Amin Hassanzadeh1 , Radu Stoleru1 , and Basem Shihada2 1

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2012-01-29 02:12:00
    162

    The workshop will treat aspects of the different methods of porosimetry, such as N2 Sorption, Hg intrusion, SAXS, SANS, NMR, TEM and Positron Annihilation. A number of tutorial talks will introduce the different techniqu

    Add to Reading List

    Source URL: positron.physik.uni-halle.de

    Language: English - Date: 2015-09-09 15:38:35
      163Computing / System software / Software / Internet Standards / Intrusion detection systems / Bro / System administration / Network management / Internet protocols / Syslog / NetFlow / Dynamic Host Configuration Protocol

      The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin

      Add to Reading List

      Source URL: www.troopers.de

      Language: English - Date: 2014-12-14 12:00:01
      164Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

      Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

      Add to Reading List

      Source URL: home.regit.org

      Language: English - Date: 2015-10-01 09:35:59
      165Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

      JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

      Add to Reading List

      Source URL: www.cs.umd.edu

      Language: English - Date: 2014-03-28 12:39:15
      166

      The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

      Add to Reading List

      Source URL: matthias.vallentin.net

      Language: English - Date: 2016-03-04 12:19:03
        167

        Intrusion Response Using Difference Rewards for Scalability and Online Learning Kleanthis Malialis Sam Devlin

        Add to Reading List

        Source URL: swarmlab.unimaas.nl

        Language: English - Date: 2014-04-16 06:09:41
          168

          Syllable intrusion in Japanese puns, dajare Kazuko Shinohara1 and Shigeto Kawahara2 1 Tokyo University of Agriculture and Technology, 2Rutgers University 1. Introduction This paper reports a corpus-based study of a parti

          Add to Reading List

          Source URL: user.keio.ac.jp

          Language: English - Date: 2013-06-04 01:27:35
            169

            Environment-Sensitive Intrusion Detection Jonathon T. Giffin1 , David Dagon2 , Somesh Jha1 , Wenke Lee2 , and Barton P. Miller1 1 Computer Sciences Department, University of Wisconsin {giffin,jha,bart}@cs.wisc.edu

            Add to Reading List

            Source URL: wenke.gtisc.gatech.edu

            Language: English - Date: 2011-08-22 15:12:57
              170

              Proceedings of the 43rd IEEE Conference on Decision and Control, Bahamas, DecemberOn the Statistical Distribution of Processing Times in Network Intrusion Detection 

              Add to Reading List

              Source URL: wenke.gtisc.gatech.edu

              Language: English - Date: 2011-08-22 15:12:57
                UPDATE