Intrusion

Results: 1878



#Item
441Computer network security / Telecommunications engineering / Wireless access points / Wireless security / Rogue access point / Data security / Wireless LAN / Network security / Wireless intrusion prevention system / Wireless networking / Technology / Wireless

Wireless Networks Keeping your network running smooth and secure with the latest security and site analyses A wireless network can be one of the most important features of your business, creating efficiencies, enhancing

Add to Reading List

Source URL: www.barcoding.com

Language: English - Date: 2014-12-18 22:24:37
442Data / Information / State machine replication / Replication / Communications protocol / Transmission Control Protocol / Distributed File System / Server / Windows Server / Computing / Fault-tolerant computer systems / Data synchronization

An Attack-Resilient Architecture for Large-Scale Intrusion-Tolerant Replication ∗ 1 Yair Amir1 , Brian Coan2 , Jonathan Kirsch1 , John Lane1

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:36
443Cryptography / Virtual synchrony / Consensus / State machine replication / Public-key cryptography / Verifiable secret sharing / Communications protocol / Internet Relay Chat / Computing / Fault-tolerant computer systems / Data

Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
444Fault-tolerant computer systems / Computer cluster / Scalability / Computing / Concurrent computing / Parallel computing

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-06-15 15:22:50
445Internet protocols / Internet standards / Remote administration software / Telnet / Simple Network Management Protocol / Nmap / Cisco IOS / Network security / Router / Computing / Software / System software

8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

Add to Reading List

Source URL: dcid.me

Language: English - Date: 2005-02-28 16:38:34
446Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
447Replicas / Computer storage / Replication / Medicine / Software aging / Rejuvenation / State machine replication / Fault-tolerant computer systems / Data synchronization / Computing

2014 IEEE 33rd International Symposium on Reliable Distributed Systems Towards a Practical Survivable Intrusion Tolerant Replication System Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir Depa

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2014-10-27 16:27:17
448Computer security / Parallel computing / Network processor / Intrusion prevention system / Communications protocol / Network switch / Denial-of-service attack / Transmission Control Protocol / Snort / Computer network security / Computing / Cyberwarfare

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:12:10
449Igneous rocks / Volcanology / Metamorphic rocks / Granophyre / Matrix / Clastic rock / Breccia / Petrology / Geology / Igneous petrology

Large Meteorite Impacts and Planetary Evolution Vpdf THE ONAPING INTRUSION, SUDBURY, CANADA – IMPACT MELT AND ROOF ROCKS OF THE SUDBURY IGNEOUS COMPLEX? D. Anders1, G. R. Osinski1 and R. A. F. Grieve1,2,

Add to Reading List

Source URL: www.hou.usra.edu

Language: English - Date: 2013-05-30 15:35:39
450Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
UPDATE