Back to Results
First PageMeta Content



Model-based Intrusion Assessment in Common Lisp Robert P. Goldman Steven A. Harp SIFT, LLC
Add to Reading List

Document Date: 2009-06-23 18:14:41


Open Document

File Size: 596,48 KB

Share Result on Facebook

City

Noy / Cambridge / Los Altos / London / /

Company

IEEE Intelligent Systems / Distribution Unlimited / aA aB aB / Morgan Kaufmann Publishers Inc. / Lincoln Labs / Adventium Labs / Scyllarus / Goldman Steven A. Harp SIFT LLC / Honeywell / Arcsight / Ryder / lB lC / /

Country

United States / United Kingdom / /

Currency

USD / /

/

Holiday

Assumption / /

IndustryTerm

approaches to network / qualitative probabilistic inference networks / speed online fusion / intrusion detection systems / network intrusion detection systems / belief networks / dependency networks / pipelined systems / online documentation / expert systems / search algorithms / test network / medium-sized corporate network / speed networks / victim software / mail server / depth-first search / intrusion detection algorithms / bona fide mailing list server / individual intrusion detection systems / corporate network / network-mapping software runs / operational network / semantic web contents / done using search algorithms / /

Organization

Association for the Advancement / Attack Registry and Intelligence Service / US Federal government / Artificial Copyright Intelligence / U.S. Defense Advanced Research Projects Agency / SPAWAR Systems Center / Association for Computational Linguistics / /

Person

Dempster-Shafer Belief / /

Position

extractor / D. J. / translator / net evaluator / RT / enterprise security manager / representative / /

ProvinceOrState

N. F. / /

PublishedMedium

Computational Linguistics / IEEE Intelligent Systems / /

Technology

labeling algorithms / using search algorithms / Lua / intrusion detection algorithms / RAID / IDS algorithms / DNS / artificial intelligence / Java / http / same algorithm / list server / /

URL

http /

SocialTag