Intrusion

Results: 1878



#Item
191

Sentinel Intrusion Prevention Systems Dallas, Texashttp://www.networkcloaking.com Sentinel Internal Intelligence.

Add to Reading List

Source URL: sentinelips.com

Language: English - Date: 2015-06-09 15:08:18
    192

    Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection Thomas H. Ptacek

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2008-08-26 17:57:08
      193

      Correlation between NetFlow System and Network Views for Intrusion Detection

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2004-05-17 14:02:11
        194

        A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1, Wenke Lee2, David Schimmel1, Didier Contis1, Mohamed Koné2, Ashley Thomas2 Center for Experimental Research in Computer Systems (CERCS) Ge

        Add to Reading List

        Source URL: wenke.gtisc.gatech.edu

        Language: English - Date: 2011-08-22 15:12:58
          195

          Sentinel Intrusion Prevention Systems Dallas, Texashttp://www.networkcloaking.com Sentinel IPS: A Conceptual View

          Add to Reading List

          Source URL: sentinelips.com

          Language: English - Date: 2015-06-09 15:08:18
            196

            SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1,2 , Zhaoyan Xu1 , Jialong Zhang1 , Lei Xu1 , Haopei Wang1 , and Guofei Gu1 1

            Add to Reading List

            Source URL: faculty.cs.tamu.edu

            Language: English - Date: 2014-06-24 10:53:10
              197

              Mobile Networks and Applications ? (–16 1 Intrusion Detection Techniques for Mobile Wireless Networks

              Add to Reading List

              Source URL: wenke.gtisc.gatech.edu

              Language: English - Date: 2011-08-22 15:12:58
                198

                Microsoft PowerPointBeyond intrusion prevention.ppt [Compatibility Mode]

                Add to Reading List

                Source URL: mqtechconference.com

                Language: English - Date: 2015-09-28 22:46:51
                  199Computing / Software / System software / Computer network security / Computer networking / Data security / Cyberwarfare / Wireless networking / Firewall / Transmission Control Protocol / Packet analyzer / Packet loss

                  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

                  Add to Reading List

                  Source URL: www1.icsi.berkeley.edu

                  Language: English - Date: 2012-09-26 16:43:08
                  200

                  Webinar slide presentation: On the Reliability and Availability of Intrusion Tolerant Systems

                  Add to Reading List

                  Source URL: webpages.alunos.fc.ul.pt

                  Language: English - Date: 2012-07-02 17:45:04
                    UPDATE