Snort

Results: 123



#Item
21Computing / Bloom filter / Software / Hash table / Hash function / Snort / Randomized algorithm / Trie / Search algorithms / Hashing / Theoretical computer science

Carousel: Scalable Logging for Intrusion Prevention Systems Vinh The Lam† , Michael Mitzenmacher⋆ , George Varghese† † ⋆ University of California, San Diego

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2010-03-06 15:42:35
22Computer security / Sourcefire / Management / Security information and event management / Managed services / Snort / Service provider / Business / Software / Computer network security

PDF Document

Add to Reading List

Source URL: www.emulex.com

Language: English
23Computer security / Data security / Intrusion detection systems / Snort / Anomaly detection / Network intrusion detection system / Intrusion prevention system / Alert correlation / Evasion / Computer network security / System software / Software

PDF Document

Add to Reading List

Source URL: romisatriawahono.net

Language: English - Date: 2013-01-23 01:11:11
24System software / Snort / Intrusion prevention system / Firewall / Intrusion detection system / Transmission Control Protocol / Deep packet inspection / Packet Processing / Network processor / Computer network security / Computing / Software

SafeCard: a Gigabit IPS on the network card Willem de Bruijn† , Asia Slowinska† , Kees van Reeuwijk† , Tomas Hruby† , Li Xu∗ , and Herbert Bos† † Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-06-27 14:10:05
25Demerit / Brunello / Bolle / Sophrosyne / Tanah / Yokozuna / Snort / Sheedy / Shadowfax / Main Belt asteroids / Pierini / Melete

LeaderboardTROA/LUXBET WINTER CHAMPIONSHIP - POINTS TABLE HORSE DR NIPANDTUCK TOUGH FUTURE

Add to Reading List

Source URL: www.troa.com.au

Language: English - Date: 2011-07-06 02:04:57
26Software / Computing / Intrusion detection system / Honeyd / Geographic information system / Snort / Client honeypot / Computer network security / Honeypot / Cyberwarfare

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2005-12-14 05:05:52
27Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
28Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-27 17:31:10
29Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
30Computer security / Parallel computing / Network processor / Intrusion prevention system / Communications protocol / Network switch / Denial-of-service attack / Transmission Control Protocol / Snort / Computer network security / Computing / Cyberwarfare

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:12:10
UPDATE