Intrusion

Results: 1878



#Item
211

Running Head: INTRUSION OF INTUITIVE METAPHYSICS 1 Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics*

Add to Reading List

Source URL: www.wesleybuckwalter.org

Language: English - Date: 2015-08-04 13:13:25
    212

    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

    Add to Reading List

    Source URL: wenke.gtisc.gatech.edu

    Language: English - Date: 2011-08-22 15:12:58
      213

      A Cooperative Intrusion Detection System for Ad Hoc Networks Yi-an Huang Wenke Lee

      Add to Reading List

      Source URL: wenke.gtisc.gatech.edu

      Language: English - Date: 2011-08-22 15:12:57
        214

        MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY? MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?

        Add to Reading List

        Source URL: www.kudelskisecurity.com

        Language: English - Date: 2015-09-24 11:05:59
          215

          Toward Survivable Intrusion-Tolerant Open-Source SCADA Thomas Tantillo Department of Computer Science at Johns Hopkins University Abstract—As vital components of critical infrastructure,

          Add to Reading List

          Source URL: www.cnds.jhu.edu

          Language: English - Date: 2015-06-29 17:51:23
            216

            Chapter Two Networks vs. Hierarchies I. The Systematic Stupidity of Hierarchies The intrusion of power into human relationships creates irrationality and systematic stupidity. As Robert Anton Wilson argued in “Thirteen

            Add to Reading List

            Source URL: dl.dropboxusercontent.com

            Language: English
              217

              On the Reliability and Availability of Systems Tolerant to Stealth Intrusion

              Add to Reading List

              Source URL: webpages.alunos.fc.ul.pt

              Language: English - Date: 2012-11-22 13:58:17
                218

                research-article2013 PSSXXX10.1177/0956797613512661Gollan et al.Language Intrusion Errors Research Article

                Add to Reading List

                Source URL: pages.ucsd.edu

                Language: English - Date: 2014-03-12 13:12:26
                  219

                  Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection ∗ Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, F´abio Souto, Miguel Correia, Nuno F. Neves University of Lisboa, Faculdade de Ciˆen

                  Add to Reading List

                  Source URL: www.di.fc.ul.pt

                  Language: English - Date: 2009-05-27 13:59:31
                    220Computing / Engineering / Physics / Data synchronization / Fault-tolerant computer systems / Replication / Wormhole / Replica / Fault tolerance

                    1 Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery Paulo Sousa, Member, IEEE, Alysson Neves Bessani, Miguel Correia, Member, IEEE, Nuno Ferreira Neves, Member, IEEE, Paulo Verissimo, Fellow,

                    Add to Reading List

                    Source URL: www.di.fc.ul.pt

                    Language: English - Date: 2009-05-27 14:24:49
                    UPDATE