Intrusion

Results: 1878



#Item
321Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
322Tides / Geography of Japan / Geodesy / Geophysics / Navigation / Water / Moon / Season / Seto Inland Sea / Physical oceanography / Planetary science / Prefectures of Japan

Journal of Oceanography Vol. 49, pp. 369 toThe Kyucho in the Bungo Channel, Japan —Periodic Intrusion of Oceanic Warm Water HIDETAKA TAKEOKA1 , HIDEKI AKIYAMA1 and TAKAHIRO KIKUCHI 2

Add to Reading List

Source URL: www.terrapub.co.jp

Language: English - Date: 2002-06-25 00:49:57
323Ultramafic rocks / Cratons / Igneous petrology / Kimberlite / Harzburgite / Layered intrusion / Kaapvaal craton / Peridotite / Greenstone belt / Geology / Petrology / Economic geology

South African Research on volcanic and related rocks and mantle-derived materials: J.S. Marsh South African National Correspondent, IAVCEI Department of Geology Rhodes University

Add to Reading List

Source URL: fr.iugg.org

Language: English - Date: 2012-07-27 07:54:45
324Text messaging / Advantage / 9 Metis / Bayesian network / Wireless / Mobile technology / Technology / SMS

METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures? Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou Chalmers University of Technology, Gothenburg, Sweden vinmas,almgren,ptri

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:40:32
325Theoretical computer science / Rough set / Attribute grammar / Alert messaging / Internet privacy / Privacy / Attribute / Lookup table / Computing / Computer programming / Ethics

A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-02 15:23:09
326Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
327Resurgent dome / Caldera / Geothermal areas of Yellowstone / Geyser / Yellowstone National Park / Interferometric synthetic aperture radar / Yellowstone earthquake / Geothermal gradient / Volcano / Geology / Volcanology / Yellowstone Caldera

Vol 440|2 March 2006|doi:nature04507 LETTERS Uplift, thermal unrest and magma intrusion at Yellowstone caldera Charles W. Wicks1, Wayne Thatcher1, Daniel Dzurisin2 & Jerry Svarc1

Add to Reading List

Source URL: volcanoes.usgs.gov

Language: English
328Software bugs / Memory management / Buffer overflow / Pointer / X86 memory segmentation / C / Stack / X86 / Virtual memory / Computing / Software engineering / Computer programming

Program semantics-Aware Intrusion Detection Prof. Tzi-cker Chiueh Computer Science Department Stony Brook University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
329Software / Intrusion prevention system / System administration / Intrusion detection system / EnGarde Secure Linux / Network security / Computer network security / System software / Computer security

Internet Defense and Detectionindd

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:56
330Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
UPDATE