Intrusion

Results: 1878



#Item
241

Curso Online de Especialización en Seguridad informática para la intrusión de sistemas. Metasploit en profundidad De Miércoles 1 a Martes 14 de Julio de 2015 Orientado a: -

Add to Reading List

Source URL: www.criptored.upm.es

Language: Spanish - Date: 2015-05-13 08:13:34
    242

    A Visual Mathematical Model for Intrusion Detection Greg Vert Deborah A. Frincke Jesse C. McConnell

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 1998-10-28 00:00:00
      243

      Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines Pavel Laskov and Christin Sch¨afer Fraunhofer-FIRST Kekul´estrBerlin, Germany

      Add to Reading List

      Source URL: www-rsec.cs.uni-tuebingen.de

      Language: English - Date: 2010-03-31 05:12:25
        244

        Endpoint Security Manager 2.0 Comodo SecureBox containerization technology was named the Gold Winner in the “Intrusion Detection, Prevention” category in InfoSecurity’s 2015 Global Excellence awards1

        Add to Reading List

        Source URL: securebox.comodo.com

          245Electronics / Computer network security / Mobile technology / IP Multimedia Subsystem / Multimedia / Telephony / Denial-of-service attack / Intrusion detection system / Internet Relay Chat / Technology / Videotelephony / Electronic engineering

          Visio-DoS_paper_figures.vsd

          Add to Reading List

          Source URL: mcn.cse.psu.edu

          Language: English - Date: 2009-01-20 15:41:05
          246Volcanology / Igneous rock / Aphanite / Dacite / Rhyodacite / Sill / Phenocryst / Dike / Intrusion / Petrology / Igneous petrology / Geology

          RHYODACITE DIKES OF THE QUEENS TUNNEL, NYC WATER TUNNEL #3

          Add to Reading List

          Source URL: dukelabs.com

          Language: English - Date: 2010-09-12 19:11:19
          247Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

          A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

          Add to Reading List

          Source URL: www.gatsby.ucl.ac.uk

          Language: English - Date: 2006-10-19 19:27:44
          248Computer network security / Intrusion detection systems / OSSEC / Computer security / Daniel B. Cid / Rootkit / Snort / Log analysis / Security log / System software / Software / Computing

          Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

          Add to Reading List

          Source URL: ossec.net

          Language: English - Date: 2012-06-29 13:37:34
          249

          Mod´elisation et simulation du canal de communication d’un botnet pour l’´evaluation des syst`emes de d´etection d’intrusion r´eseau Georges Bossert Guillaume Hiet

          Add to Reading List

          Source URL: www.netzob.org

          Language: French - Date: 2015-04-21 11:46:12
            250

            Alarme anti-intrusion L’ATLAS 2013 D’EN TOUTE SÉCURITÉ EN PROMOTION

            Add to Reading List

            Source URL: www.security-info.com

            Language: French - Date: 2014-04-15 06:28:38
              UPDATE