Intrusion

Results: 1878



#Item
681Traffic flow / Denial-of-service attack / Anomaly detection / Transmission Control Protocol / OSI protocols / Computer network security / Computing / Intrusion detection system

Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Add to Reading List

Source URL: netvue.cs.arizona.edu

Language: English - Date: 2014-10-16 13:25:04
682Cyberwarfare / Software testing / Credit cards / Computer network security / Automated teller machine / Payment Card Industry Data Security Standard / Intrusion detection system / Host-based intrusion detection system / Penetration test / Computer security / Payment systems / Technology

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
683Aquifers / Pollutants / Air pollution / Building biology / Soil contamination / Trichloroethylene / Vapor intrusion / Volatile organic compound / Groundwater / Pollution / Environment / Water

Microsoft Word - SourceHC09[removed]doc

Add to Reading List

Source URL: www.atsdr.cdc.gov

Language: English - Date: 2009-08-10 08:49:06
684Data synchronization / Computer storage / Theory of computation / Replication / Byzantine fault tolerance / Intrusion tolerance / State machine replication / Fault-tolerant system / Communications protocol / Computing / Fault-tolerant computer systems / Fault tolerance

INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
685Software / Denial-of-service attack / Snort / Intrusion detection system / Computer network security / Cyberwarfare / Computer security

THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2006-11-15 03:11:14
686Geolocation / Radio navigation / Tracking / Ubiquitous computing / IEEE 802.11 / Received signal strength indication / Multilateration / Wi-Fi / Wireless security / Technology / Navigation / Wireless

Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection Philip Nobles1 , Shahid Ali2 and Howard Chivers3 1,3 Cranfield University Defence Academy of the UK Swindon, UK

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2011-08-07 11:38:43
687Physical geography / Earth / Hydraulic engineering / Water wells / Hydrogeology / Artesian aquifer / Groundwater / Cone of depression / Saltwater intrusion / Hydrology / Water / Aquifers

PDF Document

Add to Reading List

Source URL: pubs.usgs.gov

Language: English - Date: 2011-01-26 16:52:46
688Stratovolcanoes / Plate tectonics / Decade Volcanoes / Tungurahua / Interferometric synthetic aperture radar / Types of volcanic eruptions / Mount Unzen / Strombolian eruption / Volcano / Geology / Volcanology / Volcanism

GEOPHYSICAL RESEARCH LETTERS, VOL. 37, L21302, doi:[removed]2010GL044942, 2010 Stratovolcano growth by co‐eruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1,2,3 P. Mothes,4 M. Ruiz,4 F. Amelung,2 T.

Add to Reading List

Source URL: www.geodesy.miami.edu

Language: English - Date: 2011-01-25 09:46:42
689Password / IEEE / Login / PC Card / Computer hardware / Computing / Disk encryption

Tactical IT Intrusion Portfolio FINFIREWIRE Technical Surveillance Units and Forensic Experts often face a situation where they need to access a running computer system without shutting it down in order to prevent data

Add to Reading List

Source URL: wikileaks.org

Language: English - Date: 2013-09-04 13:55:34
690Crime prevention / Public safety / Security engineering / Warning systems / Surveillance / NEC / Burglar alarm / Closed-circuit television / Open Source Tripwire / Security / Safety / National security

Behavior Detection Solution NEC’s highly efficient and user-friendly Behavior Detection Solution automatically detects suspicious behavior such as intrusion, loitering and object abandonment based on user-defined time

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-01-29 21:32:35
UPDATE