Intrusion detection system

Results: 338



#Item
1Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Add to Reading List

Source URL: ieee-ssci2018.org

Language: English - Date: 2018-04-07 06:55:01
    2ALERT LOGIC THREAT MANAGER ® ™  NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    Add to Reading List

    Source URL: www.alertlogic.com

    Language: English - Date: 2018-08-16 13:48:55
      3Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

      Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

      Add to Reading List

      Source URL: homeostasis.scs.carleton.ca

      - Date: 2007-01-02 10:18:15
        4Intrusion	Detection	System	Installation Installation	(Already	completed)	 	 apt-get	update	&&	apt-get	install	libpcre3	libpcre3-dbg	build-essential	autoconf	automake

        Intrusion Detection System Installation Installation (Already completed) apt-get update && apt-get install libpcre3 libpcre3-dbg build-essential autoconf automake

        Add to Reading List

        Source URL: jpyorre.com

        - Date: 2016-10-15 17:51:19
          5

          Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

          Add to Reading List

          Source URL: netcom.army.mil

          - Date: 2009-10-26 18:26:12
            6Experimental Evaluation of Qualitative Probability applied to Sensor Fusion and Intrusion Detection/Diagnosis Robert P. Goldman and John Maraist Abstract We experimentally analyze the accuracy of the System Z+

            Experimental Evaluation of Qualitative Probability applied to Sensor Fusion and Intrusion Detection/Diagnosis Robert P. Goldman and John Maraist Abstract We experimentally analyze the accuracy of the System Z+

            Add to Reading List

            Source URL: qr15.sift.net

            - Date: 2015-08-11 09:14:44
              7This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

              This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

              Add to Reading List

              Source URL: www.cs.unm.edu

              - Date: 2010-04-09 00:32:36
                8Microsoft Word - Call_CRC_gk

                Microsoft Word - Call_CRC_gk

                Add to Reading List

                Source URL: www.icsd.aegean.gr

                Language: English - Date: 2016-01-26 04:44:13
                9CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

                CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

                Add to Reading List

                Source URL: jon.oberheide.org

                Language: English - Date: 2015-10-11 18:23:54
                10Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

                Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

                Add to Reading List

                Source URL: www.tsc.com

                Language: English - Date: 2015-08-27 14:40:43