Intrusion

Results: 1878



#Item
481Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
482Volcanology / Cumulate rock / Igneous differentiation / Layered intrusion / Anorthosite / Magma / Fractional crystallization / Tholeiitic magma series / Andesite / Petrology / Igneous petrology / Igneous rocks

EUG XI Symposium VPP4 What Is a Magma Chamber?

Add to Reading List

Source URL: www.the-conference.com

Language: English - Date: 2009-11-05 09:13:18
483Chemistry / Mineral / Skaergaard intrusion / Native metal / Supergene / Tellurium / Economic geology / Matter / Petrology

Microsoft PowerPoint - 14Natives

Add to Reading List

Source URL: ruby.colorado.edu

Language: English - Date: 2012-11-30 15:29:20
484Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
485Security / Network security / Zero-day attack / Layered security / Pass the hash / Intrusion prevention system / Password / Malware / Attack / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
486Intrusion detection system / OSSEC / Snort / Intrusion prevention system / NuFW / Alert correlation / System software / Software / Computer network security

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
487Hydrology / Aquifers / Hydraulic engineering / Groundwater / Reclaimed water / Water resources / Saltwater intrusion / Water well / Ogallala Aquifer / Water / Environment / Earth

Managed aquifer recharge South West information sheet, November 2013 Background The Department of Water defines managed aquifer recharge as:

Add to Reading List

Source URL: www.watercorporation.com.au

Language: English - Date: 2014-10-20 23:20:41
488Data security / Data analysis / Intrusion detection system / Anomaly / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Anomaly detection

Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-10-22 16:33:27
489Computer security / Intrusion detection system / Petri net / Bro / AAFID / Computer network security / Security / Cyberwarfare

Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-10-07 21:16:46
490Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
UPDATE