Intrusion detection system

Results: 338



#Item
31The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory  http://www.icir.org/robin

The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory http://www.icir.org/robin

Add to Reading List

Source URL: www.troopers.de

Language: English - Date: 2014-12-14 12:00:01
32Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2015-10-01 09:35:59
33JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-03-28 12:39:15
34Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
35MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡  †

MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:32
36A Streaming Intrusion Detection System for Grid Computing Environments Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg

A Streaming Intrusion Detection System for Grid Computing Environments Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2010-11-03 12:17:51
    37Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

    Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:10
    38The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

    The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2012-03-22 16:55:00
    39Éric Leblond 44 rue Bayen ParisFRANCE Email:  URL: https://home.regit.org

    Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

    Add to Reading List

    Source URL: home.regit.org

    Language: English - Date: 2013-09-19 13:58:52
    40Insider Threats  Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

    Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35