Intrusion

Results: 1878



#Item
311Technology / Wireless sensor network / Intrusion detection system / Wireless ad-hoc network / Wireless security / Telecommunications engineering / Computing / AAFID / Intrusion detection system evasion techniques / Wireless networking / Computer security / Computer network security

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:15:00
312Aquifers / Earth / Hydraulic engineering / Everglades / Surficial aquifer / Lake Okeechobee / Saltwater intrusion / Water supply / Palm Beach County /  Florida / Water / Geography of Florida / Hydrology

S O U T H F L O R I D A W A T E R

Add to Reading List

Source URL: www.sfwmd.gov

Language: English
313Alkenes / Soil contamination / Trichloroethylene / Water pollution / Moffett Federal Airfield / Groundwater / United States Environmental Protection Agency / Superfund / Vapor intrusion / Pollution / Environment / Earth

DRAFT FORMER NAVAL AIR STATION MOFFETT FIELD RESTORATION ADVISORY BOARD MEETING MOUNTAIN VIEW SENIOR CENTER MOUNTAIN VIEW, CALIFORNIA AUGUST 7, 2014

Add to Reading List

Source URL: navydocs.nuqu.org

Language: English - Date: 2014-11-10 23:21:52
314Internet backbone / Intrusion detection system

Debugging the Data Plane with Anteater

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-09-01 15:21:39
315Software / Deep packet inspection / Packet capture / Snort / Network security / Packet Processing / Suricata / Intrusion detection system / DAG Technology / Computer network security / System software / Computing

PDF Document

Add to Reading List

Source URL: www.bivio.net

Language: English - Date: 2012-10-31 14:10:56
316Linux kernel / Monolithic kernels / Kernel / Grsecurity / Rootkit / Ring / PaX / Loadable kernel module / Mandatory access control / System software / Software / Computer architecture

Intrusion detection for resource-constrained embedded control systems in the power grid

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
317Design / Communication / Marketing / Internet marketing / Advertising / Communication design / Graphic design

Provides Windows security news, articles, tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics. WindowS

Add to Reading List

Source URL: www.techgenix.com

Language: English - Date: 2014-11-07 07:17:09
318Security / End point security / Spyware / Network security / Vulnerability / Intrusion prevention system / Application software / Check Point Integrity / Sourcefire / Computer network security / Cyberwarfare / Computer security

CONSIDERATIONS ON WASSENAAR ARRANGEMENT CONTROL LIST ADDITIONS FOR SURVEILLANCE

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-03-09 16:23:23
319Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
320Data / Mobile ad hoc network / Optical burst switching / Wireless ad-hoc network / Routing / Communications protocol / Intrusion detection system / Computer network / Data mining / Wireless networking / Technology / Telecommunications engineering

COMPUTER SCIENCE RESEARCH PROJECTS 2003 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2013-12-09 11:41:13
UPDATE