Intrusion

Results: 1878



#Item
431Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
432Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-27 17:31:10
433Cyberwarfare / Computer security / Crime prevention / National security / Intrusion detection system / Network security / Telecommunications data retention / Threat / Surveillance / Computer network security / Security / Computing

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-07-14 15:42:26
434Aughenbaugh Peak / Dufek Massif / Cordiner Peaks / Sallee Snowfield / Kistler Valley / Pensacola Mountains / Edith Ronne Land / Geography of Antarctica

References Abel, K. DPlagioclases of the Dufek intrusion, Antarctica. M.A thesis, University of Missouri. Albee, A. L., and L. RayCorrection factors for electron probe microanalysis of silicates, oxides,

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2011-05-06 03:40:20
435Layered intrusion / Gabbro / Cumulate rock / Pyroxenite / Anorthosite / Dufek Massif / Diabase / Plagioclase / Fractional crystallization / Petrology / Igneous petrology / Igneous rocks

Revision of known area of Dufek intrusion J . C. BEHRENDT U.S. Geological Survey Denver, Colorado 80225

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2011-05-06 03:39:45
436Aughenbaugh Peak / Sallee Snowfield / Dufek Massif / Anorthosite / Cordiner Peaks / Forrestal Range / Cumulate rock / Ford Ice Piedmont / Kistler Valley / Pensacola Mountains / Edith Ronne Land / Geography of Antarctica

This interpretation is supported by an argon isochron plot of 40Ar/36Ar and 40K/36 Ar values (R. W. Kistler, unpublished data, The pyroxene shows much greater optical homogeneity than in the Dufek intrusion. The b

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2011-05-06 03:41:03
437Soil contamination / Air pollution / Building biology / Radon / Halogenated solvents / Vapor intrusion / Trichloroethylene / Indoor air quality / Pollution / Chemistry / Environment

Final NYSDOH CEH BEEI Soil Vapor Intrusion Guidance October 2006 Appendix A Highlights of document revisions

Add to Reading List

Source URL: www.health.ny.gov

Language: English - Date: 2006-10-30 11:56:03
438Tectosilicates / Feldspar / Economic geology / Layered intrusion / Anorthosite / Cumulate rock / Skaergaard intrusion / Gabbro / Plagioclase / Petrology / Igneous rocks / Igneous petrology

Times New Roman Bold Italic

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2011-05-06 06:40:16
439Module theory / Syzygy / Anomaly detection / Anomaly / Intrusion detection system / Type I and type II errors / Statistics / Data mining / Spam filtering

Community Epidemic Detection using Time-Correlated Anomalies Adam J. Oliner, Ashutosh V. Kulkarni, and Alex Aiken Stanford University� {oliner, ashutosh.kulkarni, aiken}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-09-07 15:35:08
440Internet / Internet standards / Computer network security / Cyberwarfare / Streaming / Transmission Control Protocol / Port / Transport layer / Secure Shell / Computing / Internet protocols / Network architecture

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection Holger Dreger TU M¨unchen Anja Feldmann

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2009-04-11 23:28:18
UPDATE