<--- Back to Details
First PageDocument Content
Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security
Date: 2004-02-27 15:21:35
Computer security
Data security
Crime prevention
National security
Intrusion detection system
Anomaly detection
Honeypot
Vulnerability
Intrusion detection system evasion techniques
Computer network security
Cyberwarfare
Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Download Document from Source Website

File Size: 962,64 KB

Share Document on Facebook

Similar Documents

Cyberwarfare / Secure communication / Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Tor / Proxy server / Computer security / Draft:Energy related security attacks / Intrusion detection system evasion techniques

Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech Report

DocID: 1maCv - View Document

Technology / Wireless sensor network / Intrusion detection system / Wireless ad-hoc network / Wireless security / Telecommunications engineering / Computing / AAFID / Intrusion detection system evasion techniques / Wireless networking / Computer security / Computer network security

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

DocID: 19jWt - View Document

Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidenceāˆ— Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

DocID: 18NKY - View Document

Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

DocID: 14ISf - View Document

Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

DocID: 13tAz - View Document