Intrusion detection system

Results: 338



#Item
41Correlation between NetFlow System and Network Views for Intrusion Detection

Correlation between NetFlow System and Network Views for Intrusion Detection

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2004-05-17 14:02:11
    42Focus  Simple Event Correlator for real-time security log monitoring Risto Vaarandi

    Focus Simple Event Correlator for real-time security log monitoring Risto Vaarandi

    Add to Reading List

    Source URL: ristov.github.io

    Language: English - Date: 2016-03-01 13:52:01
    43Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

    Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2015-08-08 10:32:39
    44The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

    The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2015-08-20 16:00:38
    45Invensys  White Paper is now

    Invensys White Paper is now

    Add to Reading List

    Source URL: iom.invensys.com

    Language: English - Date: 2015-05-08 05:42:47
    46A Cooperative Intrusion Detection System for Ad Hoc Networks Yi-an Huang Wenke Lee

    A Cooperative Intrusion Detection System for Ad Hoc Networks Yi-an Huang Wenke Lee

    Add to Reading List

    Source URL: wenke.gtisc.gatech.edu

    Language: English - Date: 2011-08-22 15:12:57
      47Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

      Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:02
      48INTRUSION DETECTION SYSTEM RESILIENCY TO BYZANTINE ATTACKS: THE CASE STUDY OF WORMHOLES IN OLSR John S. Baras, Svetlana Radosavac, George Theodorakopoulos University of Maryland College Park College Park, MDand

      INTRUSION DETECTION SYSTEM RESILIENCY TO BYZANTINE ATTACKS: THE CASE STUDY OF WORMHOLES IN OLSR John S. Baras, Svetlana Radosavac, George Theodorakopoulos University of Maryland College Park College Park, MDand

      Add to Reading List

      Source URL: users.cs.cf.ac.uk

      Language: English - Date: 2012-09-20 10:48:58
        49Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2  1

        Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2 1

        Add to Reading List

        Source URL: sc07.supercomputing.org

        Language: English - Date: 2007-10-05 15:33:58