Intrusion

Results: 1878



#Item
171Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
172

On the Reliability and Availability of Systems Tolerant to Stealth Intrusion

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-08-01 11:24:42
    173

    Sentinel Intrusion Prevention Systems Dallas, Texashttp://www.networkcloaking.com The next generation of

    Add to Reading List

    Source URL: sentinelips.com

    Language: English - Date: 2015-06-09 15:08:18
      174

      A Concurrency Model for Event-Based Network Intrusion Detection Matthias Vallentin Seth Fowler

      Add to Reading List

      Source URL: matthias.vallentin.net

      Language: English - Date: 2016-03-04 12:19:03
        175

        Chapter Two Networks vs. Hierarchies I. The Systematic Stupidity of Hierarchies The intrusion of power into human relationships creates irrationality and systematic stupidity. As Robert Anton Wilson argued in “Thirtee

        Add to Reading List

        Source URL: dl.dropboxusercontent.com

        Language: English
          176

          Introduction to Intrusion Protection and Network Security Jennifer Vesperman

          Add to Reading List

          Source URL: ldp.rtin.bz

          Language: English - Date: 2002-03-20 10:00:48
            177Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

            MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

            Add to Reading List

            Source URL: conferences2.sigcomm.org

            Language: English - Date: 2014-12-01 17:07:32
            178

            Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter, Eckehard Hermann, Markus Zeilinger Department of Secure Information Systems Upper Austria University of App

            Add to Reading List

            Source URL: nymity.ch

            Language: English - Date: 2015-12-06 00:57:12
              179

              A Streaming Intrusion Detection System for Grid Computing Environments Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg

              Add to Reading List

              Source URL: www.dcsec.uni-hannover.de

              Language: English - Date: 2010-11-03 12:17:51
                180Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

                Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

                Add to Reading List

                Source URL: www1.icsi.berkeley.edu

                Language: English - Date: 2012-09-26 16:43:10
                UPDATE