Intrusion detection system evasion techniques

Results: 15



#Item
1Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project  Tor Tech Report

Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech Report

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2015-10-29 15:50:00
2Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:15:00
3Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
4Microsoft Word - NIST IntrusionDetectionSystems.doc

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Language: English - Date: 2004-02-27 15:21:35
5NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
6Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
7Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
8Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2006-07-14 18:58:00
9Politecnico di Milano  Dip. Elettronica e Informazione Milano, Italy  Detecting 0-day attacks with

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Detecting 0-day attacks with

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2007-01-25 16:48:54
10IDS Evasion Techniques and Tactics

IDS Evasion Techniques and Tactics

Add to Reading List

Source URL: bandwidthco.com

Language: English - Date: 2012-02-12 19:18:28