Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Detector intruso")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 652

  • Page / 27
Export

Selection :

  • and

Perimeter intrusion detection and intruder classificationSMITH, James F.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7336, issn 0277-786X, isbn 978-0-8194-7602-9 0-8194-7602-1, 1Vol, 73361I.1-73361I.12Conference Paper

Detection of intrusions and malware & vulnerability assessment (Third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006)Büschkes, Roland; Laskov, Pavel.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36014-X, 1Vol, X-194 p, isbn 3-540-36014-XConference Proceedings

Analyzing intensive intrusion alerts via correlationPENG NING; YUN CUI; REEVES, Douglas S et al.Lecture notes in computer science. 2002, pp 74-94, issn 0302-9743, isbn 3-540-00020-8, 21 p.Conference Paper

Field testing of outdoor intrusion detection sensorsMAKI, Mel; NIEH, Roger; DICKIE, Michael et al.International Carnahan conference on security technology. 2002, pp 171-178, isbn 0-7803-7436-3, 8 p.Conference Paper

Computer security; Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and TechnologyWack, John; Cutler, Ken; Pole, Jamie et al.NIST special publication. 2002, issn 1048-776X, X, 43 pBook

Analysis of active intrusion prevention data for predicting hostile activity in computer networksGREEN, Ido; RAZ, Tzvi; ZVIRAN, Moshe et al.Communications of the ACM. 2007, Vol 50, Num 4, pp 63-68, issn 0001-0782, 6 p.Article

RAID 2004 : recent advances in intreusion detection (Sophia Antipolis, 15-17 September 2004)Jonsson, Erland; Valdes, Alfonso; Almgren, Magnus et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23123-4, XII, 314 p, isbn 3-540-23123-4Conference Proceedings

Evaluation of the diagnostic capabilities of commercial intrusion detection systemsDEBAR, Hervé; MORIN, Benjamin.Lecture notes in computer science. 2002, pp 177-198, issn 0302-9743, isbn 3-540-00020-8, 22 p.Conference Paper

Capacity verification for high speed Network Intrusion Detection SystemsHALL, Mike; WILEY, Kevin.Lecture notes in computer science. 2002, pp 239-251, issn 0302-9743, isbn 3-540-00020-8, 13 p.Conference Paper

Detecting malicious software by monitoring anomalous Windows registry accessesAPAP, Frank; HONIG, Andrew; HERSHKOP, Shlomo et al.Lecture notes in computer science. 2002, pp 36-53, issn 0302-9743, isbn 3-540-00020-8, 18 p.Conference Paper

Modeling and simulation for detecting a distributed denial of service attackSUK, Seo Hee; HO, Cho Tae.Lecture notes in computer science. 2002, pp 179-190, issn 0302-9743, isbn 3-540-00197-2, 12 p.Conference Paper

Why 6?: Defining the operational limits of stide, an anomaly-based intrusion detectorTAN, Kymie M. C; MAXION, Roy A.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 188-201, issn 1081-6011, isbn 0-7695-1543-6, 14 p.Conference Paper

An improved clone selection immune algorithmPEILI QIAO; TONG WANG; JIE SU et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, Vol 6973, pp 69730O.1-69730O.6, issn 0277-786X, isbn 978-0-8194-7164-2 0-8194-7164-XConference Paper

Interactive visualization for network and port scan detectionMUELDER, Chris; MA, Kwan-Liu; BARTOLETTI, Tony et al.Lecture notes in computer science. 2006, pp 265-283, issn 0302-9743, isbn 3-540-31778-3, 1Vol, 19 p.Conference Paper

A risk-sensitive intrusion detection modelHAI JIN; JIANHUA SUN; HAO CHEN et al.Lecture notes in computer science. 2003, pp 107-117, issn 0302-9743, isbn 3-540-00716-4, 11 p.Conference Paper

Hiding intrusions: From the abnormal to the normal and beyondTAN, Kymie; MHUGH, John; KILLOURHY, Kevin et al.Lecture notes in computer science. 2003, pp 1-17, issn 0302-9743, isbn 3-540-00421-1, 17 p.Conference Paper

A taxonomy of Web attacksALVAREZ, Gonzalo; PETROVIC, Slobodan.Lecture notes in computer science. 2003, pp 295-298, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

A mission-impact-based approach to INFOSEC alarm correlationPORRAS, Phillip A; FONG, Martin W; VALDES, Alfonso et al.Lecture notes in computer science. 2002, pp 95-114, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

Dossier détection d'intrusion sans fil = An overview of wireless intrusion detectorsMERCEREAU, C; PIFFAUT, P.Face au risque. 1999, Num 355, pp 7-16, issn 0014-6269Article

Les détecteurs d'intrusion, ces mal connus = Intrusion detectors: a system which is not well knownPRUNIER, J; QUILES, Y.Face au risque. 1989, Num 256, issn 0014-6269, 65-77 [7 p.]Article

A stochastic model for intrusionsGOLDMAN, Robert P.Lecture notes in computer science. 2002, pp 199-218, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

Symantec deception server experience with a commercial deception systemHERNACKI, Brian; BENNETT, Jeremy; LOFGREN, Thomas et al.Lecture notes in computer science. 2004, pp 188-202, issn 0302-9743, isbn 3-540-23123-4, 15 p.Conference Paper

An analysis of the 1999 DARPA/lincoln Laboratory evaluation data for network anomaly detectionMAHONEY, Matthew V; CHAN, Philip K.Lecture notes in computer science. 2003, pp 220-237, issn 0302-9743, isbn 3-540-40878-9, 18 p.Conference Paper

Towards a global Security architecture for intrusion detection and reaction managementBIDOU, Renaud; BOURGEOIS, Julien; SPIES, Francois et al.Lecture notes in computer science. 2003, pp 111-123, issn 0302-9743, isbn 3-540-20827-5, 13 p.Conference Paper

Détection périphérique = Peripheral detectionMOLIERE, G.Face au risque. 1996, Num 321, pp 49-51, issn 0014-6269Article

  • Page / 27