Intrusion

Results: 1878



#Item
671Software bugs / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / OpenBSD / Stack / Computing / Software engineering / Computer programming

Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-02 00:42:29
672Soil contamination / Aquifers / Pollutants / Environmental issues / Water pollution / Volatile organic compound / Trichloroethylene / Vapor intrusion / Groundwater / Environment / Pollution / Earth

General Comments – Perhaps a short exec summary at beginning would assist in getting a sense of the document

Add to Reading List

Source URL: www.atsdr.cdc.gov

Language: English - Date: 2006-02-28 13:34:35
673Privacy law / Tort law / Human rights / Privacy / Tort / Damages / Punitive damages / Internet privacy / Cause of action / Law / Ethics / Judicial remedies

The Tort of “Intrusion Upon Seclusion” By: Dana Schindelka Davis LLP

Add to Reading List

Source URL: www.davis.ca

Language: English - Date: 2013-06-19 18:17:39
674National security / Public safety / IP camera / Network Video Recorder / ONVIF / Closed-circuit television / Digital video recorder / Pan tilt zoom camera / Burglar alarm / Security / Video / Surveillance

Security Product Showcase EDITION 11 Innovative Access Control, Intrusion and Video Products

Add to Reading List

Source URL: www.security.honeywell.com

Language: English - Date: 2015-02-06 15:08:52
675Computer network security / Cyberwarfare / Personally identifiable information / Information security / Identity theft / Security controls / Internet privacy / Gramm–Leach–Bliley Act / Threat / Security / Computer security / Data security

Compliance_WhitePaper.indd

Add to Reading List

Source URL: www.intrusion.com

Language: English - Date: 2010-05-25 12:13:49
676Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
677Software / Anti-spam techniques / Message transfer agent / Intrusion detection system / Malware / Antivirus software / Computer virus / VMware / Simple Mail Transfer Protocol / Email / Computer-mediated communication / Computing

An Email Worm Vaccine Architecture Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science, Columbia University {stelios,ji,angelos,sal}@cs.columbia.edu Abstract.

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-01-30 15:22:18
678Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
679Routing algorithms / Distributed data storage / Network architecture / Distributed computing architecture / Flooding / Routing / Cloud computing / Internet Relay Chat flood / Data center / Computing / Concurrent computing / Distributed computing

INTRUSION-TOLERANT CLOUD MONITORING by Thomas J. Tantillo A thesis submitted to The Johns Hopkins University in conformity with the

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:42
680Access control / Computer network security / Data security / Computer security / Wireless security / Role-based access control / Mobile / Wireless intrusion prevention system / Framework Programmes for Research and Technological Development / Wireless networking / Security / Technology

WIPS 구성도 같은 그림 추가

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 09:04:16
UPDATE