Snort

Results: 123



#Item
41Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
42The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
43Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
44Özmen Emre DEMİRKOL ([removed[removed]SNORT­2.3, ACID FEDORA 3 – PF, SNORTSAM OPENBSD 3.6

Özmen Emre DEMİRKOL ([removed[removed]SNORT­2.3, ACID FEDORA 3 – PF, SNORTSAM OPENBSD 3.6

Add to Reading List

Source URL: csirt.ulakbim.gov.tr

Language: Turkish - Date: 2006-04-07 03:27:28
    45BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

    BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-23 09:24:18
    46Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

    Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:37
    47324_IPS_05.qxd[removed]:59 PM

    324_IPS_05.qxd[removed]:59 PM

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:36
    48Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

    Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:36
    49Text  Crossing the Streams with State Machines in IDS Signature Languages Michael Rash ShmooCon 2014 FireTalks

    Text Crossing the Streams with State Machines in IDS Signature Languages Michael Rash ShmooCon 2014 FireTalks

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2014-01-18 20:47:09
    50fire_03.book Page 173 Monday, August 27, 2007 3:54 PM  10 DEPLOYING FWSNORT  With the theoretical discussion in Chapter 9 on the emulation of Snort rule options

    fire_03.book Page 173 Monday, August 27, 2007 3:54 PM 10 DEPLOYING FWSNORT With the theoretical discussion in Chapter 9 on the emulation of Snort rule options

    Add to Reading List

    Source URL: www.nostarch.com

    Language: English - Date: 2012-02-08 15:24:21