exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 102 RSS Feed

Files Date: 2006-11-01 to 2006-11-02

Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
SHA-256 | b35c688d5912ca6b3d789328c4e4a6e187a7d8c3ef95b11e1529030e8287538d
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
SHA-256 | 0cb4a3046f7bf52bd0b79c0cbfe693b088d13cc12fc0289d06e30e18c8114e8c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
SHA-256 | ad80f2bb538c68b96ee709af75a70a2fae32e56977d7f19e998361089e52922d
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
SHA-256 | a6a812761c18136a77155455be3a7647d70dec890681e1d874f2143672587d31
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
SHA-256 | 2af73f0d81a7be88804e65be8fc333406c2fbbd53f394f35f29fe3432578771f
Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
Posted Nov 1, 2006

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

tags | paper
SHA-256 | d1e793eb894a058b611199b27ae1fdafbd3b6366813722d9d8a1243fd4743797
Connection-History-Based-Anomaly-Detection.pdf
Posted Nov 1, 2006

Connectionhistory Based Anomaly Detection.

tags | paper
SHA-256 | 83f53982d1f972a9de97b6bbee118e150b2b9cc20cd442db5d0cbe80d1947eb3
Correlating-Alerts-Using-Prerequistes-of-Intrusions.pdf
Posted Nov 1, 2006

Correlating Alerts Using Prerequistes of Intrusions.

tags | paper
SHA-256 | ae24469850810588568de08c56716ae14b11ebffca28d8fec3e3709cee2bebef
Detecting-Anomalous-Network-Traffic-with-Self-Organizing-Map.pdf
Posted Nov 1, 2006

Detecting Anomalous Network Traffic with Self Organizing Map.

tags | paper
SHA-256 | 35f6fc49f2f118b61a2578a290fcd7a9ea9b3a61e02de63de73b893e2c04f013
Detecting-Malicious-JavaScript-Code-in-Mozilla.pdf
Posted Nov 1, 2006

Detecting Malicious JavaScript Code in Mozilla.

tags | paper, javascript
SHA-256 | 3a373e1c5e410a6a7e90df53671d281a88a5bbb8ee22fdc81746ce1a45d4cecd
Detecting-Novel-Scans-Through-Pattern-Anomaly-Detection.pdf
Posted Nov 1, 2006

Detecting Novel Scans Through Pattern Anomaly Detection.

tags | paper
SHA-256 | d3e726f1d583edec97025376ab12655387592df58788e664a74b67c523d02c8e
Detecting-Viral-Propagations-Using-Email-Behaviour.pdf
Posted Nov 1, 2006

Detecting Viral Propagations Using Email Behaviour Profiles.

tags | paper
SHA-256 | fb23fc758f9af49e7aaa360c8c6d01a316f5fe608098b98afee3d5554ea0c21a
Honeycom.pdf
Posted Nov 1, 2006

Honeycom Creating Intrusion Detection Signatures Using Honeypots.

tags | paper
SHA-256 | 518c2a01e3a12bcb6fe7169f28045b828819c20792e624485680d057a721576b
ID-Using-Ensemble-of-Soft-Computing-Paradigms.pdf
Posted Nov 1, 2006

Intrusion Detection Using Ensemble of Soft Computing Paradigms.

tags | paper
SHA-256 | 7069ade49047a4207c350f03ea0890da5bcc4c30d828be44cbbf7d0909fe1e4a
ID-with-Unlabeled-Data-Using-Clustering.pdf
Posted Nov 1, 2006

Intrusion Detection with Unlabeled Data Using Clustering.

tags | paper
SHA-256 | 203845536bf8a4056ea75b4f291a54fe605f5d0b2ed60853813e4892fd0f1bfd
IDS-using-Adaptive-Regression-Splines.pdf
Posted Nov 1, 2006

Intrusion Detection Systems using Adaptive Regression Splines.

tags | paper
SHA-256 | 956e6e1661b5da940fea6539767e49bef41367e451013931d9150921faf5637d
Language-based-Generation-and-Evaluation-of-NIDS-Signatures.pdf
Posted Nov 1, 2006

Languagebased Generation and Evaluation of NIDS Signatures.

tags | paper
SHA-256 | ed8917fb1b075c6ef9358f527ebd1dba0e9d6f5b4b5c339a44ae8a888dd43a4c
Learning-Rules-for-Anomaly-Detection-of-Hostile-Network-Traffic.pdf
Posted Nov 1, 2006

Learning Rules for Anomaly Detection of Hostile Network Traffic.

tags | paper
SHA-256 | b2aaebaa3548816b97c1927df0307e400f856fe942ed9c0ea9e4851bd6ed1d6b
Mining_in_a_data-flow_environment_NIDS.pdf
Posted Nov 1, 2006

Mining in a data flow environment: Experience in Netowrk Intrusion Detection.

tags | paper
SHA-256 | 6b36a8e8324599436c06db8899c2e725fee6a7f5857d48a92f88f852924fe85c
Network-Traffic-Anomaly-Detection-based-on-Packet-Bytes.pdf
Posted Nov 1, 2006

Network Traffic Anomaly Detection based on Packet Bytes.

tags | paper
SHA-256 | 44a882e344b2cb8462f473b7cf05fc130df9b13bfae1aef6d5f0ee579305205e
NIDES-Summary.pdf
Posted Nov 1, 2006

Nextgeneration Instrusion Detection Expert System (NIDS): A summary.

tags | paper
SHA-256 | 645f03121cb6387442e2157e3b1bd44a82fd4f6457031eaad2c5d8c0869f4ecd
Polygraph.pdf
Posted Nov 1, 2006

Polygraph: Automatically Generating Signatures for Polymorphic Worms.

tags | paper, worm
SHA-256 | da1b41fe602bad7291c8016f7113690ea192d79e0a4c9eba51a3ca9c189192e9
Towards-Automatic-Generation-of-Vulnerability-Based-Signatures.pdf
Posted Nov 1, 2006

Towards Automatic Generation of Vulnerability Based Signatures.

tags | paper
SHA-256 | 523e5819d0299107dca236e8144187e014692025f0a1a3b3be8e4f35fb8af0b1
Towards-the-Scalable-Implementation-of-a-User-Level-Anomaly-Detection-System.pdf
Posted Nov 1, 2006

Towards the Scalable Implementation of a User Level Anomaly Detection System.

tags | paper
SHA-256 | 57f1dd6e0d045a13b818f2a473907674d803e83aea2a11ab9dd94be6b4941139
Undermining-Anomaly-based-IDS.pdf
Posted Nov 1, 2006

Undermining an Anomalybased Intrusion Detection System Using Common Exploits.

tags | paper
SHA-256 | b90399dd9a3cc0d592bd51c7120b738e541023f3f1c7418542dd0d85860168af
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close