Intrusion

Results: 1878



#Item
231

A Framework for Cooperative Intrusion Detection Deborah Frincke Don Tobin Jesse McConnell Jamie Marconi Dean Polla Center for Secure and Dependable Software Department of Computer Science University of Idaho

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1998-10-28 00:00:00
    232

    Air Force Intrusion Detection System Evaluation Environment Terrence G. Champion Robert S. Durst

    Add to Reading List

    Source URL: www.raid-symposium.org

    Language: English - Date: 2015-03-25 13:07:30
      233

      FAQs sobre el Curso Online de Especialización en Seguridad informática para la intrusión de sistemas. Metasploit en profundidad Más informaciónEl curso es totalmente online; lecciones de 2 horas y media de co

      Add to Reading List

      Source URL: www.criptored.upm.es

      Language: Spanish - Date: 2015-09-13 16:42:06
        234

        Machine Learning for Intrusion Detection Pavel LASKOV a,b,1 , Konrad RIECK a and Klaus-Robert MÜLLER a,c a Fraunhofer Institute FIRST.IDA b University of Tübingen, Wilhelm-Schickard-Institute for Computer Science c Tec

        Add to Reading List

        Source URL: www-rsec.cs.uni-tuebingen.de

        Language: English - Date: 2010-03-31 05:12:26
          235Natural environment / Water / Pollution / Water pollution / Soil contamination / Air pollution / Pollutants / Liquid water / Trichloroethylene / Vapor intrusion / Groundwater / Indoor air quality

          Microsoft Word - HaLo3.doc

          Add to Reading List

          Source URL: www.cpeo.org

          Language: English - Date: 2015-06-26 15:11:37
          236

          A Virtual Machine Introspection Based Architecture for Intrusion Detection Tal Garfinkel Mendel Rosenblum talg,mendel @cs.stanford.edu Computer Science Department, Stanford University 

          Add to Reading List

          Source URL: www.isoc.org

          Language: English - Date: 2003-04-07 16:01:19
            237

            Distributed Intrusion Detection with Open Source Software and Commodity Hardware +

            Add to Reading List

            Source URL: security.vt.edu

            Language: English - Date: 2016-03-01 22:58:21
              238

              Traditional Indications and Warnings for Host Based Intrusion Detection Presented by Wayne A. Campbell PRC, Inc

              Add to Reading List

              Source URL: www.certconf.org

              Language: English - Date: 2008-05-16 20:03:28
                239

                RR 15-11 | MayWISESight™: A Multispectral Smart Video-Track Intrusion Monitor SUMMARY

                Add to Reading List

                Source URL: ntl.bts.gov

                Language: English - Date: 2015-06-23 16:28:10
                  240Computer security / Cyberwarfare / Computing / Computer network security / Antivirus software / Malware / Lastline / Intrusion detection system / Advanced persistent threat / Rootkit / Duqu / Computer virus

                  Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

                  Add to Reading List

                  Source URL: blog.mrg-effitas.com

                  Language: English - Date: 2014-12-03 11:48:39
                  UPDATE