Intrusion

Results: 1878



#Item
181

Intrusion Tolerance The Crutial Way of Critical Infrastructure Protection Critical infrastructures are essentially physical processes controlled by networked computers. They’re usually as

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2008-10-21 14:22:14
    182

    Flow-Based Intrusion Detection Anna Sperotto Graduation committee: Chairman: Promoter:

    Add to Reading List

    Source URL: annasperotto.org

    Language: English - Date: 2014-12-08 14:26:32
      183Computing / Network architecture / Internet / Network protocols / Ethernet / Transmission Control Protocol / Cache / Packet processing / Virtual LAN / Ethernet frame / Internet Protocol / Network switch

      The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention Nicholas Weaver Vern Paxson

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:02
      184

      ARE COMPUTER HACKER BREAK-INS ETHICAL?* Eugene H. Spafford Department of Computer Sciences, Purdue University, West Lafayette, Indiana Recent incidents of unauthorized computer intrusion have brought about discussion of

      Add to Reading List

      Source URL: storm.cis.fordham.edu

      Language: English - Date: 2008-06-12 20:35:29
        185Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

        The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

        Add to Reading List

        Source URL: www.cs.columbia.edu

        Language: English - Date: 2012-03-22 16:55:00
        186Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

        Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

        Add to Reading List

        Source URL: home.regit.org

        Language: English - Date: 2013-09-19 13:58:52
        187

        Slide Presentation (Webinar): "On the Reliability and Availability of Intrusion Tolerant Systems"

        Add to Reading List

        Source URL: webpages.alunos.fc.ul.pt

        Language: English - Date: 2012-07-02 17:29:26
          188Data synchronization / Fault-tolerant computer systems / State machine replication / Replication / Fault tolerance / Wormhole / Replica / Recovery approach

          Resilient Intrusion Tolerance through Proactive and Reactive Recovery∗ Paulo Sousa Alysson Neves Bessani Miguel Correia Nuno Ferreira Neves Paulo Verissimo

          Add to Reading List

          Source URL: www.di.fc.ul.pt

          Language: English - Date: 2007-09-14 10:45:26
          189

          Building Intrusion Tolerant Applications Thomas Wu Michael Malkin

          Add to Reading List

          Source URL: crypto.stanford.edu

          Language: English - Date: 2010-06-04 16:24:11
            190Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

            Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

            Add to Reading List

            Source URL: ids.cs.columbia.edu

            Language: English - Date: 2011-09-04 10:44:35
            UPDATE