Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Détecteur intrus")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 673

  • Page / 27
Export

Selection :

  • and

Perimeter intrusion detection and intruder classificationSMITH, James F.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7336, issn 0277-786X, isbn 978-0-8194-7602-9 0-8194-7602-1, 1Vol, 73361I.1-73361I.12Conference Paper

Unattended Ground Sensor (UGS) systems for Homeland DefenseBRUNS, Thomas J; O'CONNELL, Raymond J; WELLS, Jeffrey S et al.SPIE proceedings series. 2003, pp 280-288, isbn 0-8194-4930-X, 9 p.Conference Paper

Detection of intrusions and malware & vulnerability assessment (Third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006)Büschkes, Roland; Laskov, Pavel.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36014-X, 1Vol, X-194 p, isbn 3-540-36014-XConference Proceedings

Analyzing intensive intrusion alerts via correlationPENG NING; YUN CUI; REEVES, Douglas S et al.Lecture notes in computer science. 2002, pp 74-94, issn 0302-9743, isbn 3-540-00020-8, 21 p.Conference Paper

Field testing of outdoor intrusion detection sensorsMAKI, Mel; NIEH, Roger; DICKIE, Michael et al.International Carnahan conference on security technology. 2002, pp 171-178, isbn 0-7803-7436-3, 8 p.Conference Paper

Computer security; Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and TechnologyWack, John; Cutler, Ken; Pole, Jamie et al.NIST special publication. 2002, issn 1048-776X, X, 43 pBook

Analysis of active intrusion prevention data for predicting hostile activity in computer networksGREEN, Ido; RAZ, Tzvi; ZVIRAN, Moshe et al.Communications of the ACM. 2007, Vol 50, Num 4, pp 63-68, issn 0001-0782, 6 p.Article

RAID 2004 : recent advances in intreusion detection (Sophia Antipolis, 15-17 September 2004)Jonsson, Erland; Valdes, Alfonso; Almgren, Magnus et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23123-4, XII, 314 p, isbn 3-540-23123-4Conference Proceedings

Evaluation of the diagnostic capabilities of commercial intrusion detection systemsDEBAR, Hervé; MORIN, Benjamin.Lecture notes in computer science. 2002, pp 177-198, issn 0302-9743, isbn 3-540-00020-8, 22 p.Conference Paper

Capacity verification for high speed Network Intrusion Detection SystemsHALL, Mike; WILEY, Kevin.Lecture notes in computer science. 2002, pp 239-251, issn 0302-9743, isbn 3-540-00020-8, 13 p.Conference Paper

Detecting malicious software by monitoring anomalous Windows registry accessesAPAP, Frank; HONIG, Andrew; HERSHKOP, Shlomo et al.Lecture notes in computer science. 2002, pp 36-53, issn 0302-9743, isbn 3-540-00020-8, 18 p.Conference Paper

An application of principal component analysis to the detection and visualization of computer network attacksLABIB, Khaled; VEMURI, V. Rao.Annales des télécommunications. 2006, Vol 61, Num 1-2, pp 218-234, issn 0003-4347, 17 p.Article

Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection frameworkCUPPENS, Frédéric; AUTREL, Fabien; BOUZIDA, Yacine et al.Annales des télécommunications. 2006, Vol 61, Num 1-2, pp 197-217, issn 0003-4347, 21 p.Article

MODERN INTRUDER DETECTION SYSTEMS.MCARTHUR J.1976; ELECTR. TIMES; G.B.; DA. 1976; NO 4389; PP. 8-9Article

EINBRUCHSUEBERWACHUNG GEWERBLICHER OBJEKTE. = LA PROTECTION CONTRE LE VOL DES DEPOTS DE MARCHANDISESFREDEBOLD W.1976; ELEKTROTECH. Z., B; DTSCH.; DA. 1976; VOL. 28; NO 22; PP. 774-776; BIBL. 2 REF.Article

SELECTION AND APPLICATION GUIDE TO COMMERCIAL INTRUSION ALARM SYSTEMSSHER AH; STENBAKKEN GN.1979; NATION. BUR. STAND., SPEC. PUBL.; USA; DA. 1979; NO 480-14; 39 P.Serial Issue

MICROWAVE INTRUDER ALARM. CONSTRUCTION OF DOPPLER RADAR TO DETECT MOVEMENT. I.HOSKING MW.1977; WIRELESS WORLD; G.B.; DA. 1977; VOL. 83; NO 1499; PP. 36-39Article

INTRUDER DETECTORS TO BEAT TOP CRIMINALSBEATON G.1973; ELECTR. TIMES; G.B.; DA. 1973; NO 4245; PP. 11-13 (2 P.)Serial Issue

Modeling and simulation for detecting a distributed denial of service attackSUK, Seo Hee; HO, Cho Tae.Lecture notes in computer science. 2002, pp 179-190, issn 0302-9743, isbn 3-540-00197-2, 12 p.Conference Paper

Why 6?: Defining the operational limits of stide, an anomaly-based intrusion detectorTAN, Kymie M. C; MAXION, Roy A.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 188-201, issn 1081-6011, isbn 0-7695-1543-6, 14 p.Conference Paper

An improved clone selection immune algorithmPEILI QIAO; TONG WANG; JIE SU et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, Vol 6973, pp 69730O.1-69730O.6, issn 0277-786X, isbn 978-0-8194-7164-2 0-8194-7164-XConference Paper

Interactive visualization for network and port scan detectionMUELDER, Chris; MA, Kwan-Liu; BARTOLETTI, Tony et al.Lecture notes in computer science. 2006, pp 265-283, issn 0302-9743, isbn 3-540-31778-3, 1Vol, 19 p.Conference Paper

A risk-sensitive intrusion detection modelHAI JIN; JIANHUA SUN; HAO CHEN et al.Lecture notes in computer science. 2003, pp 107-117, issn 0302-9743, isbn 3-540-00716-4, 11 p.Conference Paper

Hiding intrusions: From the abnormal to the normal and beyondTAN, Kymie; MHUGH, John; KILLOURHY, Kevin et al.Lecture notes in computer science. 2003, pp 1-17, issn 0302-9743, isbn 3-540-00421-1, 17 p.Conference Paper

A taxonomy of Web attacksALVAREZ, Gonzalo; PETROVIC, Slobodan.Lecture notes in computer science. 2003, pp 295-298, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

  • Page / 27