Network operations center

Results: 215



#Item
11Computer security / Computer network security / Data security / Cryptography / National security / Information security operations center / Information security / Payment Card Industry Data Security Standard / Security information and event management / Intrusion detection system / Security / Threat

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
12Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
13Network management / Computer security / Data security / System administration / Computer systems / SolarWinds / Security information and event management / Log management / Information security operations center / User Activity Monitoring / TriGeo Network Security

CTA_Free_Trial_Button_Green

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-10-20 12:51:43
14Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-02-15 14:44:42
15Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
16System software / SolarWinds / System administration / Windows Server / System Center Operations Manager / Microsoft SQL Server / Packet analyzer / Mobile device management / Network management system / Network management / Information technology management / Computing

DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fully Functional for 30 Days

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-02-24 13:04:16
17Information technology management / Network management / Electronic engineering / Dependability / Quality / Safety engineering / Technical support / Network operations center / Troubleshooting / Help desk / Customer experience management / Computing

Position Profile Job Title: Computer Support Specialist Effective Date: Organizational Structure Reports To: NOC (Network Operations Center) Supervisor

Add to Reading List

Source URL: www.digitalwest.com

Language: English - Date: 2015-05-19 17:49:32
18Cyberwarfare / Advanced persistent threat / Security event manager / Hunting / Computer security / Security / Computer network security

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-05-22 14:48:50
19Computing / Operations research / Queueing theory / Markov models / Stochastic processes / Fair queuing / FIFO / Queuing delay / Low Latency Queuing / Scheduling algorithms / Statistics / Network performance

Queue-Management Architecture for Delay Tolerant Networking Sotirios-Angelos Lenas, Stylianos Dimitriou, Fani Tsapeli, Vassilis Tsaoussidis Space Internetworking Center (SPICE), ECE Department, Democritus University of T

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2011-07-08 09:48:08
20Probability and statistics / Models of computation / Mathematical sciences / Markov models / Teletraffic / Petri net / Queueing theory / Traffic generation model / Simulation / Statistics / Operations research / Stochastic processes

Data Center Network Throughput Analysis using Queueing Petri Nets Piotr Rygielski and Samuel Kounev Institute for Program Structures and Data Organization, Karlsruhe Institute of Technology (KITKarlsruhe, Germany

Add to Reading List

Source URL: www.relate-itn.eu

Language: English - Date: 2014-09-09 04:41:09
UPDATE