Twenty Year Anniversary
Showing 1 - 25 of 43 RSS Feed

Files

A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
Posted Nov 1, 2006

A comparative study of anomaly detection schemes in network intrusion detection.

tags | paper
MD5 | dcf083a1d2e21e0da98dbad88d51d1b1
A-Data-Mining-Framework-for-Building-IDS.pdf
Posted Nov 1, 2006

A Data Mining Framework for Building Intrusion Detection Models.

tags | paper
MD5 | 64680a57e28817ba0bebc198f5b51060
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
Posted Nov 1, 2006

A Framework For An Adaptive Intrusion Detection System with Data Mining.

tags | paper
MD5 | db29d4147342fee62a836a48ed04e248
A-Framework-for-Classifying-DoS-Attacks.pdf
Posted Nov 1, 2006

A Framework for Classifying Denial of Service Attacks.

tags | paper, denial of service
MD5 | 44447f138d49336dcfb6f0acb5284296
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
Posted Nov 1, 2006

A Framework for Constructing Features and Models for Intrusion Detection Systems.

tags | paper
MD5 | 6e640b55ae7f51cd3a66d5f8d01a458d
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
Posted Nov 1, 2006

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.

tags | paper
MD5 | 9d8c2bd90e6edf496dfa72d8f0106fd9
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
Posted Nov 1, 2006

A Learning Based Approach to the Detection of SQL Attacks.

tags | paper
MD5 | 18c874195c5921eaf29ef5dd06e56b95
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

A Multimodel Approach to the Detection of Web-based Attacks.

tags | paper, web
MD5 | c4b14c8548593136d524ac6dade6a254
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
Posted Nov 1, 2006

ADAM: Detecting Intrusions by Data Mining.

tags | paper
MD5 | 48e61e3928f61a18e119516d365dbe13
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
Posted Nov 1, 2006

Adaptive ModelBased Monitoring and Threat Detection.

tags | paper
MD5 | 6960820d76e90acfb07123ded235dcd7
Advanced-Polymorphic-Worms.pdf
Posted Nov 1, 2006

Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.

tags | paper, worm
MD5 | 3590541dd2f42d7182e4d09494dcf016
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Analysis of 1999 DARPA for Network Anomaly Detection.

tags | paper
MD5 | 2719ee36307dc45274b9e0f0a54ef2b6
Anagram.pdf
Posted Nov 1, 2006

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.

tags | paper
MD5 | 3a848bb307414f7bd29bb7c1729f2ffd
ANN-for-Misuse-Detection.pdf
Posted Nov 1, 2006

Artificial Neural Networks for Misuse Detection.

tags | paper
MD5 | fceeba6f1335d679ea92c0cc2b20d5dc
Anomalous-Payload-based-NIDS.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Network Intrusion Detection.

tags | paper
MD5 | a2dc4b90cea63a81c3f26583149b086d
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Worm Detection and Signature Generation.

tags | paper, worm
MD5 | fa3d6697c273b49489b40e166f7818c5
Anomaly-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

Anomaly Detection of Webbased Attacks.

tags | paper
MD5 | 2fd4ae6f0249487b1b5dfede9e299adc
Application-of-ANN-to-Misuse-Detection.pdf
Posted Nov 1, 2006

Application of Artiticial Neural Network to Misuse Detection: Initial Results.

tags | paper
MD5 | 8d8b5efd562bf691cdb9ac644008ce83
Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
MD5 | 8c785feca2c5a1957619ddae33bc760f
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
MD5 | a55d83605ae8b4afde4c539036fa233c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
MD5 | ce8ddaabab3ae1fa293dcd8b2feb65df
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
MD5 | 763a71f31bba0e58c27cf2c818ff359e
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
MD5 | 4698086eb08b12f07f28cbd16516b847
Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
Posted Nov 1, 2006

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

tags | paper
MD5 | 11199f6a5d6aef24e681ee9404ace4d7
Connection-History-Based-Anomaly-Detection.pdf
Posted Nov 1, 2006

Connectionhistory Based Anomaly Detection.

tags | paper
MD5 | 5c667c43386d188500d20dc84401ef31
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Mueller Indicts 12 Russian Intelligence Officers, Including Guccifer 2.0, For Hacking Democrats
Posted Jul 13, 2018

tags | headline, hacker, government, usa, russia, cyberwar, spyware, fbi
Bogus MDM System Used To Hack iPhones In India
Posted Jul 13, 2018

tags | headline, malware, phone, india, fraud, apple
Chrome Adds Ambitious Browser Mitigation For Spectre
Posted Jul 13, 2018

tags | headline, flaw, google, patch, chrome, intel
Cisco Patches High-Severity Bug In VoIP Phones
Posted Jul 13, 2018

tags | headline, flaw, patch, cisco
Ukraine Claims It Blocked VPNFilter Attack At Chemical Plant
Posted Jul 13, 2018

tags | headline, malware, cyberwar, scada
Ticketmaster Breach Part Of Massive Card Skimming Campaign
Posted Jul 12, 2018

tags | headline, hacker, privacy, bank, data loss, fraud
Hackers Are Selling Backdoors Into PCs For $10
Posted Jul 12, 2018

tags | headline, hacker, fraud, backdoor
Cambridge Analytica Staff Set Up New Firm
Posted Jul 12, 2018

tags | headline, government, privacy, data loss, fraud, cyberwar, facebook
Stolen Sensitive Drone Files Sold On Dark Web
Posted Jul 12, 2018

tags | headline, hacker, government, data loss, cyberwar
A Curious Tale Of The Priest, The Broker, The Hacked Newswires, And $100 Million Of Insider Trades
Posted Jul 11, 2018

tags | headline, hacker, bank, russia, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close