Intrusion detection systems

Results: 104



#Item
1PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB

PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB

Add to Reading List

Source URL: www.rennes.supelec.fr

Language: English - Date: 2009-10-01 09:50:26
    2Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗  † Institute of Computer Science

    Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗  † Institute of Computer Science

    Add to Reading List

    Source URL: dcs.ics.forth.gr

    - Date: 2012-03-22 09:28:01
      3Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation

      Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation

      Add to Reading List

      Source URL: www.ics.forth.gr

      - Date: 2012-03-22 09:27:59
        4Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

        Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

        Add to Reading List

        Source URL: homeostasis.scs.carleton.ca

        - Date: 2007-01-02 10:18:15
          5Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC

          Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC

          Add to Reading List

          Source URL: moss.csc.ncsu.edu

          - Date: 2010-03-29 18:00:23
            6

            Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

            Add to Reading List

            Source URL: netcom.army.mil

            - Date: 2009-10-26 18:26:12
              7Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development

              Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development

              Add to Reading List

              Source URL: www.icsd.aegean.gr

              - Date: 2013-11-25 06:34:42
                8This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

                This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back

                Add to Reading List

                Source URL: www.cs.unm.edu

                - Date: 2010-04-09 00:32:36
                  9BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

                  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

                  Add to Reading List

                  Source URL: www.cyber-ta.org

                  Language: English - Date: 2007-06-29 16:14:13
                  10Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

                  Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

                  Add to Reading List

                  Source URL: norbert-pohlmann.com

                  Language: English - Date: 2015-10-20 12:57:31