YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
Yurtseven.ORG
 Yurtseven.ORG
     
HOME Security Security Intrusion Detection Systems Intrusion Detection Systems Research Research
 
Sort by Sort by          Date Sort by       Alphabetical Sort by

Showing  1 - 10  of total  21  results  [ 0.067  seconds ]  


 
   
  07-January-2012 
Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools.



 
   
  07-January-2012 
Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems.



 
   
  07-January-2012 
Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for inte...



 
   
  07-January-2012 
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models



 
   
  07-January-2012 
SRI International's EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances) research project is a distributed scalable tool suite for tracking malicious activity through and across large networks.



 
   
  07-January-2012 
Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS.



 
   
  07-January-2012 
A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network intrusion detection system.



 
   
  07-January-2012 
Information Assurance focusing on techniques for detecting and reacting to intrusions into networked information systems. We have coordinated several evaluations of computer network intrusion detection systems.



 
   
  07-January-2012 
This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to buil...



 
   
  07-January-2012 
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.


1  2  3  Next »


Easy Web Admin


Add URL  |  My Sites  |  My Account  |  Login  |  Contact Us