Intrusion

Results: 1878



#Item
51

This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

Add to Reading List

Source URL: www.cs.unm.edu

- Date: 2010-04-09 00:32:36
    52

    DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection Maciej Korczy´nski∗ , Ali Hamieh∗ , Jun Ho Huh§ , Henrik Holm† , S. Raj Rajagopalan§ , and Nina H. Fefferman∗ ∗ †

    Add to Reading List

    Source URL: mkorczynski.com

    - Date: 2015-05-07 17:16:56
      53

      UNIVERSITY OF CALIFORNIA RIVERSIDE A Continuous Time Bayesian Network Approach for Intrusion Detection A Dissertation submitted in partial satisfaction

      Add to Reading List

      Source URL: rlair.cs.ucr.edu

      - Date: 2011-01-19 19:25:42
        54

        A&WMA “Vapor Intrusion: Learning from the Challenges”, September 26-28, 2007, Providence, RI Evaluation of Sorbent Methodology for PetroleumImpacted Site Investigations Heidi C. Hayes, Diane J. Benton, Sarbjit Grewa

        Add to Reading List

        Source URL: www.eurofinsus.com

        - Date: 2014-07-07 09:13:03
          55Computing / Computer network security / Cloud clients / Information appliances / Cybercrime / Mobile phones / Computer security / Intrusion detection system / Android / Mobile device / Malware / Smartphone

          Microsoft Word - Call_CRC_gk

          Add to Reading List

          Source URL: www.icsd.aegean.gr

          Language: English - Date: 2016-01-26 04:44:13
          56Water / Natural environment / Hydrology / Water supply / Water treatment / Aquifers / Reclaimed water / Reuse / Saltwater intrusion / Groundwater

          Microsoft WordVander Lans Expansion Dedication FINAL

          Add to Reading List

          Source URL: www.wrd.org

          Language: English - Date: 2015-12-07 16:51:45
          57Water / Hydrology / Physical geography / Biscayne Aquifer / Aquifer / Saltwater intrusion / South Florida Water Management District / Groundwater / Lake Worth Lagoon / Restoration of the Everglades

          Microsoft Word - WS-4 SW Intrusion Biscayne Aquifer MFL.doc

          Add to Reading List

          Source URL: 141.232.10.32

          Language: English - Date: 2015-03-12 09:07:47
          58Water / Hydrology / Hydraulic engineering / Hydrogeology / Aquatic ecology / Aquifer / Waterline / Groundwater / Saltwater intrusion / Water supply / Dam

          Water Storage Investment Program Concept Paper Form Please complete the questions below and return your completed concept paper by email to by 5:00 p.m. on March 31, 2016. Completed concept papers should

          Add to Reading List

          Source URL: cwc.ca.gov

          Language: English - Date: 2016-04-01 18:12:23
          59Water / Pollution / Chemistry / Water pollution / Hydrology / Hydraulic engineering / Liquid water / Vapor intrusion / Groundwater / Underground storage tank / Trichloroethylene / Soil

          Innocent until Proven Guilty: U.S. EPA’s Petroleum Vapor Intrusion Technical Guide Lenny Siegel August, 2015 On June 11, 2015, the U.S. Environmental Protection Agency released its 3.0 MB PDF Technical Guide for Addres

          Add to Reading List

          Source URL: www.cpeo.org

          Language: English - Date: 2015-08-07 17:20:43
          60Computer worms / Cyberwarfare / Cybercrime / Computer security

          EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

          Add to Reading List

          Source URL: aao.sinica.edu.tw

          Language: English - Date: 2014-10-02 04:23:39
          UPDATE