YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
www.yurtseven.org
 www.yurtseven.org
 

 
 Computers » Security » Intrusion Detection Systems » Research


 Web Pages    1 - 10   of   21


Research focuses on methods of improving the technical approach of identifying and preventing security flaws, limiting the damage from attacks, and ensuring that systems continue to provide essential services despite of compromises or failures.

http://www.cert.org/nav/index_purple.html

[more pages from this URL] 


Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.

http://seclab.cs.ucdavis.edu/

[more pages from this URL] 


The RAID workshop series is an annual event dedicated to the sharing of information related to the intrusion-detection area.

http://www.raid-symposium.org/

[more pages from this URL] 


Works on languages and tools for designing, building, and validating software systems - with a focus on threat detection and analysis. Includes details of projects and staff profiles.

http://www.cs.ucsb.edu/~rsg/

[more pages from this URL] 


Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for inte...

http://www.cs.unm.edu/~immsec/

[more pages from this URL] 


The Intrusion Detection (ID) Research Group at NC State University was formed by Dr. Peng Ning in August 2002.

http://discovery.csc.ncsu.edu/index.html

[more pages from this URL] 


Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools.

http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/

[more pages from this URL] 


Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.

http://www.csds.uidaho.edu/

[more pages from this URL] 


SRI International's EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances) research project is a distributed scalable tool suite for tracking malicious activity through and across large networks.

http://www.sdl.sri.com/projects/emerald/

[more pages from this URL] 


Information Assurance focusing on techniques for detecting and reacting to intrusions into networked information systems. We have coordinated several evaluations of computer network intrusion detection systems.

http://www.ll.mit.edu/IST/

[more pages from this URL] 




1  2  3  Next »»




Easy Web Admin


Add URL  |  My Listings  |  My Account  |  New Membership  |  Contact