Snort

Results: 123



#Item
111Software / Computer security / Data security / Intrusion detection system / System administration / AAFID / Anomaly detection / Snort / Misuse detection / Computer network security / Computing / System software

A Distributed Intrusion Detection Prototype using Security Agents V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management & Optimal Design Lab (NETMODE), ECE Department – National Technical

Add to Reading List

Source URL: www.netmode.ntua.gr

Language: English - Date: 2004-05-28 14:14:29
112Computer security / Intrusion detection system / Network intrusion detection system / Intrusion prevention system / Alert correlation / Bro / Snort / Suricata / Computer network security / System software / Software

School of Technology Module P00999 Dissertation Semester 2 – 2005

Add to Reading List

Source URL: inac.free.fr

Language: English - Date: 2005-08-03 14:14:48
113Security / Intrusion detection system / Information security / Snort / Topology / Computer network security / Computer security / Software

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation† Phillip A. Porras, Martin W. Fong, and Alfonso Valdes SRI International 333 Ravenswood Avenue Menlo Park, CA[removed]

Add to Reading List

Source URL: www.sdl.sri.com

Language: English - Date: 2007-01-23 13:43:08
114Computer security / Sourcefire / Telecommunications systems / Snort / Operations support system / GSM / Cloud computing / Real-time adaptive security / Check Point / Computer network security / Computing / Software

TECHNOLOGY BRIEF THE ROLE OF IPS IN THE TELECOMMUNICATIONS AND MOBILE SERVICE PROVIDER INDUSTRY

Add to Reading List

Source URL: www.cnis-mag.com

Language: English - Date: 2010-08-29 03:25:38
115Computer security / Intrusion detection system / Information Assurance Technology Analysis Center / Network intrusion detection system / Intrusion prevention system / Snort / Host-based intrusion detection system / Anomaly detection / Sourcefire / Computer network security / System software / Software

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
116Computing / Alert correlation / Data mining / Intrusion detection system / Anomaly detection / Snort / ACARM-ng / Computer network security / Software / System software

Managing Alerts in a Multi-Intrusion Detection Environment Frédéric Cuppens ONERA Toulouse

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2001-10-15 21:28:12
117Computing / Snort / Thresh / Intrusion detection system / Pcap / Network intrusion detection system / Tcpdump / Packet capture / Firewall / Software / Computer network security / System software

PDF Document

Add to Reading List

Source URL: people.cs.ubc.ca

Language: English - Date: 2004-09-02 20:36:22
118Theoretical computer science / Software / Pattern matching / Graphics hardware / GPGPU / Packet Processing / Nondeterministic finite automaton / Perl Compatible Regular Expressions / Snort / Automata theory / Computing / Regular expressions

PDF Document

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:27:59
119Computer network security / Netcat / Network management / Data security / Transmission Control Protocol / Firewall / NC / Packet crafting / Snort / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2013-04-24 12:17:57
120Software testing / Cross-platform software / Nmap / NUbuntu / BackTrack / Fuzz testing / Metasploit Project / Snort / Penetration test / Software / System software / Computer network security

PDF Document

Add to Reading List

Source URL: www.linux-magazine.com

Language: English - Date: 2008-06-16 11:50:35
UPDATE