Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Intruder detector")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 668

  • Page / 27
Export

Selection :

  • and

Perimeter intrusion detection and intruder classificationSMITH, James F.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7336, issn 0277-786X, isbn 978-0-8194-7602-9 0-8194-7602-1, 1Vol, 73361I.1-73361I.12Conference Paper

Detection of intrusions and malware & vulnerability assessment (Third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006)Büschkes, Roland; Laskov, Pavel.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36014-X, 1Vol, X-194 p, isbn 3-540-36014-XConference Proceedings

Analyzing intensive intrusion alerts via correlationPENG NING; YUN CUI; REEVES, Douglas S et al.Lecture notes in computer science. 2002, pp 74-94, issn 0302-9743, isbn 3-540-00020-8, 21 p.Conference Paper

Field testing of outdoor intrusion detection sensorsMAKI, Mel; NIEH, Roger; DICKIE, Michael et al.International Carnahan conference on security technology. 2002, pp 171-178, isbn 0-7803-7436-3, 8 p.Conference Paper

Analysis of active intrusion prevention data for predicting hostile activity in computer networksGREEN, Ido; RAZ, Tzvi; ZVIRAN, Moshe et al.Communications of the ACM. 2007, Vol 50, Num 4, pp 63-68, issn 0001-0782, 6 p.Article

RAID 2004 : recent advances in intreusion detection (Sophia Antipolis, 15-17 September 2004)Jonsson, Erland; Valdes, Alfonso; Almgren, Magnus et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23123-4, XII, 314 p, isbn 3-540-23123-4Conference Proceedings

Computer security; Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and TechnologyWack, John; Cutler, Ken; Pole, Jamie et al.NIST special publication. 2002, issn 1048-776X, X, 43 pBook

Evaluation of the diagnostic capabilities of commercial intrusion detection systemsDEBAR, Hervé; MORIN, Benjamin.Lecture notes in computer science. 2002, pp 177-198, issn 0302-9743, isbn 3-540-00020-8, 22 p.Conference Paper

Capacity verification for high speed Network Intrusion Detection SystemsHALL, Mike; WILEY, Kevin.Lecture notes in computer science. 2002, pp 239-251, issn 0302-9743, isbn 3-540-00020-8, 13 p.Conference Paper

Detecting malicious software by monitoring anomalous Windows registry accessesAPAP, Frank; HONIG, Andrew; HERSHKOP, Shlomo et al.Lecture notes in computer science. 2002, pp 36-53, issn 0302-9743, isbn 3-540-00020-8, 18 p.Conference Paper

MODERN INTRUDER DETECTION SYSTEMS.MCARTHUR J.1976; ELECTR. TIMES; G.B.; DA. 1976; NO 4389; PP. 8-9Article

EINBRUCHSUEBERWACHUNG GEWERBLICHER OBJEKTE. = LA PROTECTION CONTRE LE VOL DES DEPOTS DE MARCHANDISESFREDEBOLD W.1976; ELEKTROTECH. Z., B; DTSCH.; DA. 1976; VOL. 28; NO 22; PP. 774-776; BIBL. 2 REF.Article

SELECTION AND APPLICATION GUIDE TO COMMERCIAL INTRUSION ALARM SYSTEMSSHER AH; STENBAKKEN GN.1979; NATION. BUR. STAND., SPEC. PUBL.; USA; DA. 1979; NO 480-14; 39 P.Serial Issue

MICROWAVE INTRUDER ALARM. CONSTRUCTION OF DOPPLER RADAR TO DETECT MOVEMENT. I.HOSKING MW.1977; WIRELESS WORLD; G.B.; DA. 1977; VOL. 83; NO 1499; PP. 36-39Article

An improved clone selection immune algorithmPEILI QIAO; TONG WANG; JIE SU et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, Vol 6973, pp 69730O.1-69730O.6, issn 0277-786X, isbn 978-0-8194-7164-2 0-8194-7164-XConference Paper

Interactive visualization for network and port scan detectionMUELDER, Chris; MA, Kwan-Liu; BARTOLETTI, Tony et al.Lecture notes in computer science. 2006, pp 265-283, issn 0302-9743, isbn 3-540-31778-3, 1Vol, 19 p.Conference Paper

A risk-sensitive intrusion detection modelHAI JIN; JIANHUA SUN; HAO CHEN et al.Lecture notes in computer science. 2003, pp 107-117, issn 0302-9743, isbn 3-540-00716-4, 11 p.Conference Paper

Hiding intrusions: From the abnormal to the normal and beyondTAN, Kymie; MHUGH, John; KILLOURHY, Kevin et al.Lecture notes in computer science. 2003, pp 1-17, issn 0302-9743, isbn 3-540-00421-1, 17 p.Conference Paper

A taxonomy of Web attacksALVAREZ, Gonzalo; PETROVIC, Slobodan.Lecture notes in computer science. 2003, pp 295-298, issn 0302-9743, isbn 3-540-40522-4, 4 p.Conference Paper

A mission-impact-based approach to INFOSEC alarm correlationPORRAS, Phillip A; FONG, Martin W; VALDES, Alfonso et al.Lecture notes in computer science. 2002, pp 95-114, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

Dossier détection d'intrusion sans fil = An overview of wireless intrusion detectorsMERCEREAU, C; PIFFAUT, P.Face au risque. 1999, Num 355, pp 7-16, issn 0014-6269Article

Les détecteurs d'intrusion, ces mal connus = Intrusion detectors: a system which is not well knownPRUNIER, J; QUILES, Y.Face au risque. 1989, Num 256, issn 0014-6269, 65-77 [7 p.]Article

Modeling and simulation for detecting a distributed denial of service attackSUK, Seo Hee; HO, Cho Tae.Lecture notes in computer science. 2002, pp 179-190, issn 0302-9743, isbn 3-540-00197-2, 12 p.Conference Paper

Why 6?: Defining the operational limits of stide, an anomaly-based intrusion detectorTAN, Kymie M. C; MAXION, Roy A.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 188-201, issn 1081-6011, isbn 0-7695-1543-6, 14 p.Conference Paper

A stochastic model for intrusionsGOLDMAN, Robert P.Lecture notes in computer science. 2002, pp 199-218, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

  • Page / 27