Intrusion

Results: 1878



#Item
701Wireless intrusion prevention system / Security / Computer security / Technology / Computer network security / Wireless networking / Data security / Aircrack-ng

OpenWIPS-ng A modular and Open source WIPS Thomas d’Otreppe, Author of Aircrack-ng 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-07-13 14:35:04
702Earth / Soft matter / Hydraulic engineering / Water supply / Hydrogeology / Groundwater / Injection well / Surficial aquifer / Saltwater intrusion / Water / Hydrology / Aquifers

SUBSURFACE STORAGE OF FRESHWATER IN SOUTH FLORIDA: A PROSPECTUS By Michael L. Merritt, Frederick W. Meyer, Wayne H. Sonntag, and Daniel J. Fitzpatrick

Add to Reading List

Source URL: pubs.usgs.gov

Language: English - Date: 2010-11-30 00:39:46
703Security / Intrusion detection system / OWASP / Application security / Vulnerability / Snort / Evasion / Attack / Computer security / Cyberwarfare / Computer network security

OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:50:03
704Computer network security / OWASP / Computing / Snort / Sourcefire / Computer security / Software / Security

Custom Intrusion Detection Techniques for Monitoring Web Applications Matthew Olney Sourcefire VRT

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:51
705

Программное обеспечение IBM Решения IBM Security Система IBM Security Network Intrusion Prevention System Превентивная защита сети от угроз

Add to Reading List

Source URL: public.dhe.ibm.com

Language: Russian - Date: 2010-11-09 11:33:50
    706Computer network security / Denial-of-service attacks / Computing / Network performance / Artificial neural network / Random neural network / Robust random early detection / Intrusion detection system / Denial-of-service attack / Statistics / Neural networks / Computational neuroscience

    A Denial of Service Detector based on Bayesian Classifiers and the Random Neural Network ¨ ∗ and Georgios Loukas G¨ ulay Oke Electrical and Electronic Engineering, Imperial College London, UK

    Add to Reading List

    Source URL: san.ee.ic.ac.uk

    Language: English - Date: 2007-04-30 15:58:30
    707Computer security / Intrusion detection systems / Snort / Network intrusion detection system / Apache HTTP Server / Burglar alarm / Host-based intrusion detection system / Transmission Control Protocol / Prelude Hybrid IDS / Software / System software / Computer network security

    Security Information Management b-i branding. technology. integration. www.b-i.com

    Add to Reading List

    Source URL: www.b-i.com

    Language: English - Date: 2014-06-17 04:23:05
    708Cyberwarfare / Intrusion detection system / Sourcefire / Intrusion prevention system / Network intrusion detection system / Clone Systems /  Inc. / Snort / Computer network security / System software / Computing

    Managed Intrusion Detection Real Time Network Visibility

    Add to Reading List

    Source URL: www.signify.net

    Language: English - Date: 2014-02-19 04:12:34
    709Technology / Cisco Systems / Deep packet inspection / Electronics / Network security / Event data / Smart grid / Security information and event management / Cisco Security Monitoring /  Analysis /  and Response System / Computer security / Videotelephony / Computing

    At-A-Glance Cisco and IBM: Enhanced Security for Operators of Critical Infrastructure Cisco and IBM Cisco next-generation intrusion-prevention system IPS

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
    710Cluster analysis / Geostatistics / Machine learning / Anomaly detection / SUBCLU / Outlier / Intrusion detection system / Clustering high-dimensional data / Local outlier factor / Statistics / Data mining / Data analysis

    Network Intrusion Detection using a Secure Ranking of Hidden Outliers Marwan Hassani and Thomas Seidl Data Management and Data Exploration Group RWTH Aachen University, Germany {hassani, seidl}@cs.rwth-aachen.de

    Add to Reading List

    Source URL: dme.rwth-aachen.de

    Language: English - Date: 2015-02-10 13:03:28
    UPDATE