Intrusion

Results: 1878



#Item
221Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
222

INTRUSION DETECTION SYSTEM RESILIENCY TO BYZANTINE ATTACKS: THE CASE STUDY OF WORMHOLES IN OLSR John S. Baras, Svetlana Radosavac, George Theodorakopoulos University of Maryland College Park College Park, MDand

Add to Reading List

Source URL: users.cs.cf.ac.uk

Language: English - Date: 2012-09-20 10:48:58
    223

    A Mathematical and Data-Driven Approach to Intrusion Detection for High-Performance Computing David H Bailey Lawrence Berkeley National Laboratory http://crd.lbl.gov/~dhbailey With input from

    Add to Reading List

    Source URL: www.davidhbailey.com

    Language: English - Date: 2012-11-07 15:24:50
      224

      On the Reliability and Availability of Systems Tolerant to Stealth Intrusion

      Add to Reading List

      Source URL: webpages.alunos.fc.ul.pt

      Language: English - Date: 2011-07-05 21:49:50
        225Water / Natural environment / Hydrology / Water supply / Aquifers / Hydraulic engineering / Hydrogeology / Pajaro River / Groundwater / Saltwater intrusion / Reclaimed water / Salinas Valley

        Here Comes the Sea: The Struggle to Keep the Ocean out of California’s Coastal Aquifers | Circle of Blue WaterNews Select Language Powered by 

        Add to Reading List

        Source URL: www.pvwma.dst.ca.us

        Language: English - Date: 2015-10-02 20:49:30
        226

        Fast Packet Classification using Condition Factorization⋆ Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan Stony Brook University Abstract. Rule-based packet classification plays a central role in network intrusion detec

        Add to Reading List

        Source URL: seclab.cs.sunysb.edu

        Language: English - Date: 2014-07-10 01:53:32
          227

          A Building Block Approach to Intrusion Detection Mark J. Crosbie Hewlett-Packard Company

          Add to Reading List

          Source URL: www.raid-symposium.org

          Language: English - Date: 2015-03-25 13:05:15
            228

            Approved for public release; distribution is unlimited. The Diamond Model of Intrusion Analysis Sergio Caltagirone Andrew Pendergast

            Add to Reading List

            Source URL: www.activeresponse.org

            Language: English - Date: 2013-07-06 14:14:09
              229

              ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION. Dima Novikov (Rochester Institute of Technology, Rochester, NY, ), Roman V. Yampolskiy (University at Bufalo, Buffalo, NY,

              Add to Reading List

              Source URL: cecs.louisville.edu

              Language: English - Date: 2015-09-21 11:15:15
                230Computing / Data mining / Computer security / Information technology management / Anomaly detection / Data security / Intrusion detection system / Information technology / Anomaly / GridFTP / Transmission Control Protocol

                Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2 1

                Add to Reading List

                Source URL: sc07.supercomputing.org

                Language: English - Date: 2007-10-05 15:33:58
                UPDATE