Network intelligence

Results: 2949



#Item
961Network architecture / OpenFlow / Network intelligence / Network virtualization / Network switch / Cloud computing / Software Defined Networking / Deep packet inspection / Computer network security / Computing

White Paper The Role of DPI in an SDN World Prepared by Graham Finnie

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:06:39
962Mobile phones / Mobile computers / Computer network security / Aruba Networks / Mobile device management / Bring your own device / Identity management / Wi-Fi / Mobile business intelligence / Technology / Computing / Mobile technology

SOLUTION OVERVIEW THE CLEARPASS ACCESS MANAGEMENT SYSTEM™ Remember when IT was the gatekeeper of everything

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2014-07-22 09:09:47
963Computer network security / Security / Malware / Spamming / Computer crimes / Advanced persistent threat / Web threat / Phishing / Computer worm / Cyberwarfare / Cybercrime / Computer security

ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave of fear, hype, an

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-05-21 15:02:17
964Artificial intelligence / Mathematics / Decomposition method / Precondition / Algorithm / Applied mathematics / Automated planning and scheduling / Hierarchical task network / Constraint programming

Learning HTN Method Preconditions and Action Models from Partial Observations

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2009-07-14 20:12:38
965Mathematical optimization / Mathematics / Evolutionary algorithms / Evolution / Genetic algorithm / Evolutionary computation / Artificial life / Genetic programming / Artificial neural network / Science / Applied mathematics / Cybernetics

KNOWLEDGE MANAGEMENT, ORGANIZATIONAL INTELLIGENCE AND LEARNING, AND COMPLEXITY - Vol. I Genetic Algorithms - Calabretta R. GENETIC ALGORITHMS Calabretta R. Institute of Cognitive Sciences and Technologies, National Rese

Add to Reading List

Source URL: www.eolss.net

Language: English - Date: 2011-09-21 10:55:06
966Security / Privacy of telecommunications / Privacy / National Security Agency / Foreign Intelligence Surveillance Act / American Civil Liberties Union / Patriot Act / New York Civil Liberties Union / Very high-speed Backbone Network Service / National security / Surveillance / Mass surveillance

Microsoft Word - Complaint - DRAFT v8.docx

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
967Crowdsourcing / DARPA Network Challenge / DARPA / Twitter / Red Balloon / Ficus / Technology / World Wide Web / Collective intelligence

Time-Critical Social Mobilization Galen Pickard et al. Science 334, ); DOI: scienceThis copy is for your personal, non-commercial use only.

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2015-03-20 10:55:59
968

Flow-Based Network Intelligence Flowyou can depend on. NetFlow Auditor is Part of a Threat Detection Mitigation Plan •

Add to Reading List

Source URL: analyze.netflowauditor.com

- Date: 2014-05-23 20:46:54
    969System software / Companies listed on the New York Stock Exchange / Computer security / Computer network security / Host Based Security System / McAfee / Antivirus software / Software

    Data Sheet McAfee Threat Intelligence Exchange Delivering adaptive threat prevention in real time

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-12-05 16:44:45
    970Wireless sensor network / Home automation / Ambient intelligence / Internet of Things / Smart system / ZigBee / Bluetooth / ANT / Home network / Technology / Computing / Emerging technologies

    Sentrollers, and the World of Small Data After Big Data, it is now Small Data’s turn to change our world By Cees Links, GreenPeak Technologies Jun[removed] “Small Data will control our businesses, homes, and even ou

    Add to Reading List

    Source URL: www.greenpeak.com

    Language: English - Date: 2015-03-24 10:37:57
    UPDATE