Intrusion

Results: 1878



#Item
531Evasion / Application firewall / Security / Computer security / Cyberwarfare / Intrusion detection system

The Challenges of HTTP Intrusion Detection The Challenges of HTTP Intrusion Detection

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
532Earth / Physical geography / Hydraulic engineering / Groundwater / Hydrogeology / Water well / Surface water / Saltwater intrusion / Groundwater model / Water / Hydrology / Aquifers

Hydrol. Earth Syst. Sci., 13, 1185–1199, 2009 www.hydrol-earth-syst-sci.net[removed]/ © Author(s[removed]This work is distributed under the Creative Commons Attribution 3.0 License. Hydrology and

Add to Reading List

Source URL: www.hydrol-earth-syst-sci.net

Language: English - Date: 2014-12-04 02:28:55
533

‫‪Advanced Intrusion Detection Environment‬‬ ‫السلم عليكم ورحمة ال وبركاته‬ ‫كيف أحوال الشباب إن شاء ال الجميع بخير وعافية ‪ ...‬اليوم

Add to Reading List

Source URL: www.binary-zone.com

Language: Arabic - Date: 2011-05-27 06:48:51
    534Espionage / Intelligence / Collective intelligence / Open-source intelligence / Intelligence collection management / Intelligence assessment / Open source intelligence / National security / Intelligence gathering disciplines / Data collection

    Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

    Add to Reading List

    Source URL: www.binary-zone.com

    Language: English - Date: 2012-10-30 12:44:10
    535Network architecture / Distributed data storage / Distributed computing architecture / Overlay network / Routing / Link-state routing protocol / Computer network / Flooding / Distributed hash table / Routing algorithms / Computing / Computer architecture

    Intrusion-Tolerant Cloud Monitoring and Control Daniel Obenshain Tom Tantillo Andrew Newell

    Add to Reading List

    Source URL: www.dsn.jhu.edu

    Language: English - Date: 2013-09-18 16:37:33
    536Science / Mathematics / Logic in computer science / Data mining / Neuro-fuzzy / Intrusion detection system / Fuzzy control system / Association rule learning / Fuzzy classification / Logic / Fuzzy logic / Artificial intelligence

    Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 Department of Computer Science, Oklahoma State University, USA

    Add to Reading List

    Source URL: www.softcomputing.net

    Language: English - Date: 2005-02-04 10:21:43
    537Wireless / Telecommunications engineering / Data security / Secure communication / Wireless intrusion prevention system / Wireless security / Payment Card Industry Data Security Standard / Hotspot / WIPS / Wireless networking / Technology / Computer network security

    Wireless LAN (WLAN) infrastructure attacks are today one of the most critical and immediate threats to enterprise networks. To make matters worse, the consumerization of Wi-Fi is flooding enterprises with personal Wi-Fi

    Add to Reading List

    Source URL: www.e92plus.com

    Language: English - Date: 2014-02-25 06:33:49
    538Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

    Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:36
    539Computer storage / Replication / Medicine / Rejuvenation / Software aging / Replica / Public-key cryptography / Science / State machine replication / Data synchronization / Fault-tolerant computer systems / Computing

    Towards a Practical Survivable Intrusion Tolerant Replication System Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir Department of Computer Science at Johns Hopkins University {platania, dano,

    Add to Reading List

    Source URL: www.cnds.jhu.edu

    Language: English - Date: 2014-04-09 12:17:25
    540Network security / Sentinel

    Sentinel Intrusion Prevention Systems Dallas, Texas[removed]removed] http://www.networkcloaking.com The next generation of

    Add to Reading List

    Source URL: networkcloaking.com

    Language: English - Date: 2013-09-27 16:57:33
    UPDATE