Packet analyzer

Results: 66



#Item
21Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1  Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
22Distinct   Network Monitor

Distinct  Network Monitor

Add to Reading List

Source URL: www.distinct-de.com

Language: English - Date: 2003-04-10 16:48:28
23MONITOR - SOLUTIONS BRIEF  Emulex Keeps Financial Institutions in the Black At a glance Financial institutions have stringent requirements for

MONITOR - SOLUTIONS BRIEF Emulex Keeps Financial Institutions in the Black At a glance Financial institutions have stringent requirements for

Add to Reading List

Source URL: www.emulex.com

Language: English
24The Visa Fraud Control group has seen increased number of exploits on ecommerce merchants

The Visa Fraud Control group has seen increased number of exploits on ecommerce merchants

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2009-07-16 02:59:35
25CommView Helps Dallas Semiconductor/MAXIM in Hardware Testsk

CommView Helps Dallas Semiconductor/MAXIM in Hardware Testsk

Add to Reading List

Source URL: www.tamos.com

Language: English - Date: 2009-06-17 06:08:20
26WHITEPAPER  Prepare for the Inevitable: Managing the Risk of Unplanned Network Downtime A guide to streamlining the NetOps workflow through

WHITEPAPER Prepare for the Inevitable: Managing the Risk of Unplanned Network Downtime A guide to streamlining the NetOps workflow through

Add to Reading List

Source URL: www.emulex.com

Language: English
27Promiscuous Monitoring in Ethernet and Wi-Fi Networks

Promiscuous Monitoring in Ethernet and Wi-Fi Networks

Add to Reading List

Source URL: www.tamos.com

Language: English - Date: 2005-12-21 02:43:40
28216  IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13,

216 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13,

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-12-18 15:46:26
29Kismet Dragorn [removed] July 10, [removed]

Kismet Dragorn [removed] July 10, [removed]

Add to Reading List

Source URL: www.kismetwireless.net

Language: English - Date: 2004-07-10 22:47:24
30CASE STUDIES  CASE STUDIES Six case studies are presented. They were chosen because they encapsulate many of the issues raised during the thirteen

CASE STUDIES CASE STUDIES Six case studies are presented. They were chosen because they encapsulate many of the issues raised during the thirteen

Add to Reading List

Source URL: health.gov.au

Language: English - Date: 2013-02-07 00:46:59