Intrusion

Results: 1878



#Item
281

2013 IEEE Security and Privacy Workshops Preventing Cell Phone Intrusion and Theft using Biometrics Fingerprint Biometric Security utilizing Dongle and Solid State Relay Technology Donny Jacob Ohana

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-05 16:05:08
    282

    Poster: Prioritizing Intrusion Analysis Using Dempster-Shafer Theory students: Loai Zomlot, Sathya Chandran Sundaramurthy, faculty: Xinming Ou Dept. of Computing and Information Sciences - Kansas State University Manhatt

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2011-05-18 11:12:44
      283

      PROCEEDINGS, TOUGH Symposium 2006 Lawrence Berkeley National Laboratory, Berkeley, California, May 15–17, 2006 SIMULATION OF SALT WATER INTRUSION Kenzi Karasaki1), Kazumasa Ito2), Keisuke Maekawa3) 1)

      Add to Reading List

      Source URL: esd.lbl.gov

      Language: English - Date: 2014-11-14 11:47:22
        284

        NORRA KÄRR En alkalin intrusion av nefelinsyenit öster om Vättern. Här finns ovanliga mineral. Bilden ovan är på en stuff från Norra Kärr i belysning med ultraviolett ljus. Mera om ultraviolett ljus och mineral f

        Add to Reading List

        Source URL: www.vendsysselstenklub.dk.

        Language: Swedish - Date: 2013-03-25 18:23:17
          285

          Intrusion post-mortem analysis Summary In the night from February 26 to February 27, 1991, an intruder accessed the machine wsinfo11 using the accounts of wsines and wsinae. The intruder did not gain system privileges. H

          Add to Reading List

          Source URL: www.fish2.com

          Language: English - Date: 2009-10-29 00:17:56
            286

            LNAIContinuous Time Bayesian Networks for Host Level Network Intrusion Detection

            Add to Reading List

            Source URL: www.cs.ucr.edu

            Language: English - Date: 2008-09-24 12:43:18
              287

              Security Against Probe-Response Attacks in Collaborative Intrusion Detection Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT

              Add to Reading List

              Source URL: www.cyber-ta.org

              Language: English - Date: 2007-06-30 16:45:34
                288Building biology / Air pollution / Flavors / Smog / Volatile organic compound / Vapor intrusion / Sorbent tube / Environment / Pollutants / Chemistry / Technology

                WATERLOO MEMBRANE SAMPLER ™ The Waterloo Membrane Sampler™ (WMS™) for

                Add to Reading List

                Source URL: www.sirem-lab.com

                Language: English - Date: 2014-03-04 16:56:07
                289Crime prevention / National security / Internet privacy / Intrusion detection system / Cyberwarfare / Computer virus / Computer security / Antivirus software / Privacy / Security / Computer network security / Ethics

                Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

                Add to Reading List

                Source URL: ieee-security.org

                Language: English - Date: 2002-11-16 13:14:38
                290Computer security / Computing / Snort / Symantec / Intrusion detection system / Sourcefire Vulnerability Research Team / Martin Roesch / Software / Computer network security / Sourcefire

                Symantec™ Intrusion Detection/Prevention Solution with Sourcefire® One-stop solution for critical next-generation network intrusion protection Data Sheet: Symantec Managed Security Services Over Overview

                Add to Reading List

                Source URL: www.symantec.com

                Language: English - Date: 2013-07-23 19:53:19
                UPDATE