Intrusion

Results: 1878



#Item
691

Intégration_des_systèmes_INTRUSION_V01

Add to Reading List

Source URL: www.securite-expo.ch

Language: French - Date: 2014-11-11 04:24:19
    692Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

    Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

    Add to Reading List

    Source URL: www.nec.com

    Language: English - Date: 2013-10-21 08:29:06
    693Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics

    Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

    Add to Reading List

    Source URL: san.ee.ic.ac.uk

    Language: English - Date: 2013-07-02 14:44:03
    694Computational statistics / Artificial intelligence / C4.5 algorithm / ID3 algorithm / Association rule learning / ReD / Intrusion detection system / Ross Quinlan / Data Analysis Techniques for Fraud Detection / Machine learning / Decision trees / Data mining

    Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 DATA MINING PROTOTYPE FOR DETECTING E-COMMERCE FRAUD [RESEARCH IN PROGRESS]

    Add to Reading List

    Source URL: is2.lse.ac.uk

    Language: English - Date: 2001-05-31 10:21:44
    695Internet / Cyberwarfare / Internet standards / Network performance / Data security / Firewall / Packet loss / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Network architecture

    Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2001-05-27 00:48:06
    696Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

    ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2005-05-30 18:56:39
    697Hydrology / Aquifers / Aquatic ecology / Saltwater intrusion / Drinking water / Water quality / Groundwater / Disinfectant / Chlorination / Water / Environment / Earth

    RJS_TEC_Steps_for_cleaning_and_disinfecting_a_well

    Add to Reading List

    Source URL: wedc.lboro.ac.uk

    Language: English - Date: 2013-09-02 07:01:51
    698Ultramafic rocks / Cratons / Igneous petrology / Kimberlite / Harzburgite / Layered intrusion / Kaapvaal craton / Peridotite / Greenstone belt / Geology / Petrology / Economic geology

    South African Research on volcanic and related rocks and mantle-derived materials: [removed]J.S. Marsh South African National Correspondent, IAVCEI Department of Geology Rhodes University

    Add to Reading List

    Source URL: www.iugg.org

    Language: English - Date: 2012-07-28 17:12:09
    699Volcanology / Igneous rocks / Shield volcanoes / Hawaiʻi Volcanoes National Park / Plate tectonics / Mauna Loa / Kīlauea / Magma / Types of volcanic eruptions / Geology / Petrology / Igneous petrology

    Stress Control of Deep Rift Intrusion at Mauna Loa Volcano, Hawaii Falk Amelung, et al. Science 316, [removed]); DOI: [removed]science[removed]The following resources related to this article are available online at

    Add to Reading List

    Source URL: www.geodesy.miami.edu

    Language: English - Date: 2007-05-23 15:31:12
    700Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

    Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:30
    UPDATE