Network intrusion detection system

Results: 247



#Item
31The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-03-22 16:55:00
32Éric Leblond 44 rue Bayen ParisFRANCE Email:  URL: https://home.regit.org

Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2013-09-19 13:58:52
33Insider Threats  Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
34Correlation between NetFlow System and Network Views for Intrusion Detection

Correlation between NetFlow System and Network Views for Intrusion Detection

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2004-05-17 14:02:11
    35Focus  Simple Event Correlator for real-time security log monitoring Risto Vaarandi

    Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi

    Add to Reading List

    Source URL: ristov.github.io

    Language: English - Date: 2016-03-01 13:52:01
    36Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

    Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2015-08-08 10:32:39
    37The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

    The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2015-08-20 16:00:38
    38Invensys  White Paper is now

    Invensys White Paper is now

    Add to Reading List

    Source URL: iom.invensys.com

    Language: English - Date: 2015-05-08 05:42:47
    39Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

    Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:02