Network intrusion detection system

Results: 247



#Item
191Espionage / Decoy / Intrusion detection system / Deception / Computer security / Counterintelligence / Snort / Attack / Computer network security / Security / Cyberwarfare

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Phase I Report on Intelligent Software Decoys:

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2003-01-02 12:51:46
192Software / Honeypot / Snort / IP address / Honeyd / Dynamic Host Configuration Protocol / Intrusion detection system / Client honeypot / Computer network security / Computing / System software

Research in Honeypot Technologies Karl Schuttler (E00921961) Eastern Michigan University College of Technology 1. Introduction The proposed research project serves to act as a practical, real-world lab on the use of exi

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:36
193Computer security / Intrusion detection system / Snort / Thresh / Alert correlation / Network intrusion detection system / Denial-of-service attack / Evasion / ACARM-ng / Computer network security / System software / Software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2011-09-28 10:25:46
194Computer emergency response team / FlowMon / Computer network security / Computer security / Cisco Security Monitoring /  Analysis /  and Response System / Threat / Intrusion detection system / MU / Request Tracker / Software / Computing / Netflow

CSIRT-MU Jan Vykopal Head of CSIRT-MU Masaryk university Brno, Czech Republic TF-CSIRT meeting – [removed], National Library of Estonia, Tallinn

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2009-09-30 14:50:51
195Security / Vulnerability / Attack / Threat / Countermeasure / Computer emergency response team / Social vulnerability / Intrusion detection system / Cyber security and countermeasure / Computer network security / Cyberwarfare / Computer security

Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2003-03-12 10:44:30
196Computer network security / Intrusion detection system / Computer emergency response team / Bro / OpenSSL / Pcap / Internet Relay Chat / Request Tracker / Software / Computing / System software

Quick&Dirty Heartbleed Detection Using Bro Jakub Svoboda, Jan Vykopal Masaryk University Introduction

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2014-07-10 09:05:44
197Honeypot / Intrusion detection system / Snort / Computing / Computer network security / Software / Spamming

Microsoft PowerPoint - TF-CSIRT_24[removed]small.ppt

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-01-25 04:53:10
198Crime prevention / National security / Computer network security / Security engineering / Computer security / Physical security / Access control / Burglar alarm / Intrusion detection system / Security / Safety / Public safety

AXSI_Microsoft BizTalk press[removed]v3

Add to Reading List

Source URL: www.axcessinc.com

Language: English - Date: 2010-08-07 14:31:16
199Computer security / Intrusion detection system / Emergency management / Internet security / Safety / Computer network security / Security / Public safety

InS_inline_and_stacked_black and white_RH

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-05-01 02:41:51
200Crime prevention / National security / Cyberwarfare / Computing / Data security / Intrusion prevention system / Information security / Intrusion detection system / Federal Information Security Management Act / Computer security / Computer network security / Security

DRAFT Special Publication[removed]Revision 1, Guide to Intrusion Detection and Prevention Systems (IDPS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:12:21
UPDATE