Intrusion

Results: 1878



#Item
271

Approved for public release; distribution is unlimited. The Diamond Model of Intrusion Analysis Sergio Caltagirone Andrew Pendergast

Add to Reading List

Source URL: www.threatconnect.com

Language: English - Date: 2013-07-29 11:44:22
    272

    Rice production or rice farmer’s livelihoods for national food security under salinity intrusion in the Mekong Delta? Dang Kieu Nhan, Nguyen Hieu Trung, Pham Thanh Vu, Hua Hong Hieu, Le Quang Tri

    Add to Reading List

    Source URL: www.watergovernance.org

    Language: English - Date: 2013-12-20 05:08:59
      273

      Long-term changes in quiescent degassing at Mount Baker Volcano, Washington, USA; Evidence for a stalled intrusion in 1975 and connection to a deep magma source

      Add to Reading List

      Source URL: volcanoes.usgs.gov

      Language: English - Date: 2010-12-06 17:58:09
        274

        2013 IEEE Security and Privacy Workshops Preventing Cell Phone Intrusion and Theft using Biometrics Fingerprint Biometric Security utilizing Dongle and Solid State Relay Technology Donny Jacob Ohana

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2013-05-05 16:05:08
          275

          Host Intrusion Prevention Systems In the current environment of ever-changing cyber threats, system and network security defenders continue to try and keep pace and limit risk. Proactive (instead of reactive) security me

          Add to Reading List

          Source URL: www.nsa.gov

          Language: English - Date: 2013-12-24 08:47:01
            276

            Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA

            Add to Reading List

            Source URL: hms.isi.jhu.edu

            Language: English - Date: 2012-02-05 23:54:00
              277

              Motivation Potential Solutions Samhain SAMHAIN An open-source Host Intrusion Detection System (HIDS)

              Add to Reading List

              Source URL: www.la-samhna.de

              Language: English - Date: 2011-03-10 08:49:37
                278

                Intrusion  Detection  &  SNORT   Fakrul  Alam     Sometimes,  Defenses  Fail   •  Our  defenses  aren’t  perfect  

                Add to Reading List

                Source URL: nsrc.org

                Language: English - Date: 2015-02-26 00:07:15
                  279

                  Mapping Social Vulnerability to Saline Intrusion in the Coastal Mekong Delta Timothy Gorman Ph.D. Candidate

                  Add to Reading List

                  Source URL: www.watergovernance.org

                  Language: English - Date: 2013-12-20 05:09:29
                    280

                    16. Trends, Natural Disasters, and Potential Impacts of Climate Change on Aquaculture Sector of Soc Trang Province 1/ Saline intrusion trend in Soc Trang TRENDS, NATURAL DISASTERS, AND POTENTIAL IMPACTS OF CLIMATE

                    Add to Reading List

                    Source URL: www.icem.com.au

                    Language: English - Date: 2010-08-02 00:19:37
                      UPDATE