Snort

Results: 123



#Item
81Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-03-26 14:41:48
82Software / Intrusion detection system / Serialization / Snort / Network intrusion detection system / Bro / Database / Communications protocol / Packet Processing / Computer network security / System software / Computing

TUM ยจ R INFORMATIK INSTITUT FU Exploiting Independent State For Network Intrusion Detection

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-10 17:58:10
83

By KRIS DEMEANOR As cultures broad see capitals deemed Horse snort less stable than once it seemed Formed there is new wiggle in rooms Scribes awl pin light through prescription doom

Add to Reading List

Source URL: albertamagazines.com

Language: English - Date: 2014-02-21 13:56:38
    84Computer security / Cyberwarfare / Iptables / Netfilter / Firewall / Snort / Denial-of-service attack / System software / Software / Computer network security

    fire_03.book Page 173 Monday, August 27, 2007 3:54 PM 10 DEPLOYING FWSNORT With the theoretical discussion in Chapter 9 on the emulation of Snort rule options

    Add to Reading List

    Source URL: www.tinker.tv

    Language: English - Date: 2012-02-08 15:24:21
    85Computing / Iptables / Snort / Netfilter / Intrusion detection system / Firewall / Thresh / Pcap / Port knocking / Software / System software / Computer network security

    fire_03.book Page 291 Monday, August 27, 2007 3:54 PM INDEX A ALERTING_METHODS variable, in psad.conf

    Add to Reading List

    Source URL: www.tinker.tv

    Language: English - Date: 2012-02-08 15:24:21
    86System software / Formal languages / Pattern matching / Intrusion detection systems / Regular expressions / Snort / Network intrusion detection system / TRE / String / Computing / Software / Computer network security

    Microsoft Word - Pawan_Kumar_Abstract_MSc_Thesis_2012

    Add to Reading List

    Source URL: etd.ncsi.iisc.ernet.in

    Language: English - Date: 2014-06-03 01:23:39
    87Boulevard / Snort / Geography of California / California / Naval Air Weapons Station China Lake

    Legend NAWS Boundary Current 14D1 Departure Flight Route

    Add to Reading List

    Source URL: www.navair.navy.mil

    Language: English - Date: 2011-09-26 13:48:22
    88Snort / Software / Computer network security / Intrusion detection system

    Intrusion detection and the role of the system administrator [removed] [removed] Swedish Defence Research Agency (FOI)

    Add to Reading List

    Source URL: www.ifip11-12.org

    Language: English - Date: 2012-09-26 06:34:12
    89American Association of State Colleges and Universities / Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools / University of Maryland /  Baltimore County / Intrusion detection system / SpamAssassin / Baltimore / Master of Science / Snort / Software / Spam filtering / Spamming

    APPROVAL SHEET Title of Thesis: EBIDS-SENLP: A System to Detect Social Engineering Email Using Natural Language Processing

    Add to Reading List

    Source URL: www.cisa.umbc.edu

    Language: English - Date: 2012-01-12 13:40:36
    90Cyberwarfare / Transmission Control Protocol / Snort / HTTP cookie / CTX / Session hijacking / Packet capture / Computer network security / Computer security / Software

    Scalable Protocol-Based Packet Inspection for Advanced Network Threat Detection 632 Broadway, Suite 803 New York, New York[removed]0527

    Add to Reading List

    Source URL: www.dhses.ny.gov

    Language: English - Date: 2013-06-03 09:18:59
    UPDATE