Network intrusion detection system

Results: 247



#Item
1Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Add to Reading List

Source URL: ieee-ssci2018.org

Language: English - Date: 2018-04-07 06:55:01
    2ALERT LOGIC THREAT MANAGER ® ™  NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

    Add to Reading List

    Source URL: www.alertlogic.com

    Language: English - Date: 2018-08-16 13:48:55
      3

      Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

      Add to Reading List

      Source URL: netcom.army.mil

      - Date: 2009-10-26 18:26:12
        4Microsoft Word - Call_CRC_gk

        Microsoft Word - Call_CRC_gk

        Add to Reading List

        Source URL: www.icsd.aegean.gr

        Language: English - Date: 2016-01-26 04:44:13
        5CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

        CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

        Add to Reading List

        Source URL: jon.oberheide.org

        Language: English - Date: 2015-10-11 18:23:54
        6Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

        Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

        Add to Reading List

        Source URL: www.tsc.com

        Language: English - Date: 2015-08-27 14:40:43
        7BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2007-06-29 16:14:13
        8ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-23 09:05:31
        9Job Opening April 19, 2016 JOB TITLE: DEPT:  System Security Administrator

        Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

        Add to Reading List

        Source URL: esd.ny.gov

        Language: English - Date: 2016-04-19 12:12:44
        10Anomaly detection from server log data.  A case study

        Anomaly detection from server log data. A case study

        Add to Reading List

        Source URL: www.vtt.fi

        Language: English - Date: 2015-03-18 09:57:49