Intrusion

Results: 1878



#Item
11

CloudIDEA - Cloud Intrusion Detection, Evidence preservation and Analysis Benjamin Taubmann ∗ Hans P. Reiser ∗ Waseem Mandarawi ∗

Add to Reading List

Source URL: eurosys2015.labri.fr

Language: English - Date: 2015-04-16 10:03:52
    12

    Innocent until Proven Guilty: U.S. EPA’s Petroleum Vapor Intrusion Technical Guide Lenny Siegel August, 2015 On June 11, 2015, the U.S. Environmental Protection Agency released its 3.0 MB PDF Technical Guide for Addres

    Add to Reading List

    Source URL: www.cpeo.org

    Language: English - Date: 2017-09-12 16:11:38
      13Machine learning / Artificial intelligence / Learning / Cybernetics / Dimension reduction / Cognition / Model selection / Feature detection / NetFlow / Training /  test /  and validation sets / Support vector machine / Feature selection

      Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

      Add to Reading List

      Source URL: nymity.ch

      Language: English - Date: 2017-08-25 13:31:01
      14

      Chapter 22: Intrusion Detection • • • • •

      Add to Reading List

      Source URL: nob.cs.ucdavis.edu

      Language: English - Date: 2004-11-02 17:07:51
        15

        2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

        Add to Reading List

        Source URL: oaklandsok.github.io

        Language: English - Date: 2018-03-14 15:33:55
          16

          Model-based Intrusion Assessment in Common Lisp Robert P. Goldman Steven A. Harp SIFT, LLC

          Add to Reading List

          Source URL: rpgoldman.goldman-tribe.org

          Language: English - Date: 2009-06-23 18:14:41
            17

            System-level Support for Intrusion Recovery Andrei Bacs, Remco Vermeulen, Asia Slowinska, and Herbert Bos {abs204,rvn270,asia,herbertb}@few.vu.nl Network Institute, VU University Amsterdam Abstract. Recovering from atta

            Add to Reading List

            Source URL: www.few.vu.nl

            Language: English - Date: 2012-06-17 04:52:16
              18

              Security Value Map™ Next Generation Intrusion Prevention Systems (NGIPS) Forcepoint Cisco Check Point

              Add to Reading List

              Source URL: www.fortinet.com

              - Date: 2018-08-06 13:09:35
                19

                A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2

                Add to Reading List

                Source URL: www.icir.org

                Language: English - Date: 2017-10-16 19:29:53
                  20

                  Final at Last: Notes on EPA’s Vapor Intrusion Technical Guide Lenny Siegel August, 2015 On June 11, 2015, the U.S. Environmental Protection Agency finally released its Vapor Intrusion Technical Guide, known officially

                  Add to Reading List

                  Source URL: www.cpeo.org

                  Language: English - Date: 2017-09-12 16:04:56
                    UPDATE