First Page | Document Content | |
---|---|---|
![]() Date: 2012-02-12 19:18:28Software Intrusion detection systems Snort Evasion Intrusion detection system Intrusion detection system evasion techniques Denial-of-service attack Buffer overflow Network intrusion detection system Computer network security Cyberwarfare Computer security | Add to Reading List |
![]() | Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech ReportDocID: 1maCv - View Document |
![]() | Kinematic Analysis of a Space MechanismāRendezvous SimulatorDocID: 19jWt - View Document |
![]() | Reasoning about Complementary Intrusion Evidenceā Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NCDocID: 18NKY - View Document |
![]() | Microsoft Word - NIST IntrusionDetectionSystems.docDocID: 14ISf - View Document |
![]() | NISTIR 7007, An Overview of Issues in Testing Intrusion Detection SystemsDocID: 13tAz - View Document |