Intrusion

Results: 1878



#Item
351Science / Scientific modeling / Data / Data analysis / Data mining / Database / Systems engineering / Intrusion detection system / Relational database / Database management systems / Database theory / Data management

COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2013-12-09 11:41:13
352Intrusion detection system / Lecture Notes in Computer Science / RAID

CALL FOR PAPERS RAID 2004 Seventh International Symposium on Recent Advances in Intrusion Detection Intrusion Detection and Society Institut Eurécom, Sophia-Antipolis, French Riviera, France - September 15-17, 2004 http

Add to Reading List

Source URL: raid04.eurecom.fr

Language: English - Date: 2004-05-17 09:41:07
353Physical geography / Hydraulic engineering / Hydrogeology / Geotechnical engineering / Groundwater / Water table / Saltwater intrusion / Water storage / Yarragadee Aquifer / Water / Hydrology / Aquifers

Frequently Asked Questions Groundwater Maximum allocation limit and aquifer restriction levels What is a maximum allocation limit? The maximum allocation limit is a limit on the volume of groundwater that can be taken

Add to Reading List

Source URL: www.orc.govt.nz

Language: English - Date: 2014-07-28 20:06:31
354Physical geography / Hydraulic engineering / Hydrogeology / Geotechnical engineering / Groundwater / Water table / Saltwater intrusion / Water storage / Yarragadee Aquifer / Water / Hydrology / Aquifers

Frequently Asked Questions Groundwater Maximum allocation limit and aquifer restriction levels What is a maximum allocation limit? The maximum allocation limit restricts the volume of groundwater that can be taken annual

Add to Reading List

Source URL: www.orc.govt.nz

Language: English - Date: 2014-09-10 17:23:55
355Alert correlation / Alert messaging

Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
356Computing / Bloom filter / Software / Hash table / Hash function / Snort / Randomized algorithm / Trie / Search algorithms / Hashing / Theoretical computer science

Carousel: Scalable Logging for Intrusion Prevention Systems Vinh The Lam† , Michael Mitzenmacher⋆ , George Varghese† † ⋆ University of California, San Diego

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2010-03-06 15:42:35
357NP-complete problems / Morphisms / Alert correlation / Graph isomorphism / Subgraph isomorphism problem / Matching / Tree / Mathematics / Theoretical computer science / Graph theory

Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
358Cyberwarfare / Computing / Alert messaging / Attack / Computer network security / Alert correlation / Computer security

Analyzing Intensive Intrusion Alerts Via Correlation Peng Ning, Yun Cui, and Douglas S. Reeves Department of Computer Science North Carolina State University Raleigh, NC , ,

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
359Hydrology / Physical oceanography / Aquifers / Tides / Hydraulic engineering / Current sea level rise / Soil salinity control / Winyah Bay / Saltwater intrusion / Earth / Water / Physical geography

Conference Proceedings Paper for the 4th Federal Interagency Hydrologic Modeling Conference Las Vegas, NV June 2010 ESTIMATING SALINITY INTRUSION EFFECTS DUE TO CLIMATE CHANGE ALONG THE GRAND STRAND OF THE SOUTH CAROLINA

Add to Reading List

Source URL: advdmi.com

Language: English - Date: 2014-01-16 13:36:31
360Dense non-aqueous phase liquid / Chemistry / Vapor intrusion / Environment / Earth / Hydrogeology / Water pollution / Light non-aqueous phase liquid

PDF Document

Add to Reading List

Source URL: www.itrcweb.org

Language: English - Date: 2015-02-19 13:11:07
UPDATE