Exploit the possiblities
Showing 1 - 25 of 43 RSS Feed

Files

A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
Posted Nov 1, 2006

A comparative study of anomaly detection schemes in network intrusion detection.

tags | paper
MD5 | dcf083a1d2e21e0da98dbad88d51d1b1
A-Data-Mining-Framework-for-Building-IDS.pdf
Posted Nov 1, 2006

A Data Mining Framework for Building Intrusion Detection Models.

tags | paper
MD5 | 64680a57e28817ba0bebc198f5b51060
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
Posted Nov 1, 2006

A Framework For An Adaptive Intrusion Detection System with Data Mining.

tags | paper
MD5 | db29d4147342fee62a836a48ed04e248
A-Framework-for-Classifying-DoS-Attacks.pdf
Posted Nov 1, 2006

A Framework for Classifying Denial of Service Attacks.

tags | paper, denial of service
MD5 | 44447f138d49336dcfb6f0acb5284296
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
Posted Nov 1, 2006

A Framework for Constructing Features and Models for Intrusion Detection Systems.

tags | paper
MD5 | 6e640b55ae7f51cd3a66d5f8d01a458d
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
Posted Nov 1, 2006

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.

tags | paper
MD5 | 9d8c2bd90e6edf496dfa72d8f0106fd9
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
Posted Nov 1, 2006

A Learning Based Approach to the Detection of SQL Attacks.

tags | paper
MD5 | 18c874195c5921eaf29ef5dd06e56b95
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

A Multimodel Approach to the Detection of Web-based Attacks.

tags | paper, web
MD5 | c4b14c8548593136d524ac6dade6a254
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
Posted Nov 1, 2006

ADAM: Detecting Intrusions by Data Mining.

tags | paper
MD5 | 48e61e3928f61a18e119516d365dbe13
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
Posted Nov 1, 2006

Adaptive ModelBased Monitoring and Threat Detection.

tags | paper
MD5 | 6960820d76e90acfb07123ded235dcd7
Advanced-Polymorphic-Worms.pdf
Posted Nov 1, 2006

Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.

tags | paper, worm
MD5 | 3590541dd2f42d7182e4d09494dcf016
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Analysis of 1999 DARPA for Network Anomaly Detection.

tags | paper
MD5 | 2719ee36307dc45274b9e0f0a54ef2b6
Anagram.pdf
Posted Nov 1, 2006

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.

tags | paper
MD5 | 3a848bb307414f7bd29bb7c1729f2ffd
ANN-for-Misuse-Detection.pdf
Posted Nov 1, 2006

Artificial Neural Networks for Misuse Detection.

tags | paper
MD5 | fceeba6f1335d679ea92c0cc2b20d5dc
Anomalous-Payload-based-NIDS.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Network Intrusion Detection.

tags | paper
MD5 | a2dc4b90cea63a81c3f26583149b086d
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Worm Detection and Signature Generation.

tags | paper, worm
MD5 | fa3d6697c273b49489b40e166f7818c5
Anomaly-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

Anomaly Detection of Webbased Attacks.

tags | paper
MD5 | 2fd4ae6f0249487b1b5dfede9e299adc
Application-of-ANN-to-Misuse-Detection.pdf
Posted Nov 1, 2006

Application of Artiticial Neural Network to Misuse Detection: Initial Results.

tags | paper
MD5 | 8d8b5efd562bf691cdb9ac644008ce83
Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
MD5 | 8c785feca2c5a1957619ddae33bc760f
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
MD5 | a55d83605ae8b4afde4c539036fa233c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
MD5 | ce8ddaabab3ae1fa293dcd8b2feb65df
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
MD5 | 763a71f31bba0e58c27cf2c818ff359e
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
MD5 | 4698086eb08b12f07f28cbd16516b847
Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
Posted Nov 1, 2006

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

tags | paper
MD5 | 11199f6a5d6aef24e681ee9404ace4d7
Connection-History-Based-Anomaly-Detection.pdf
Posted Nov 1, 2006

Connectionhistory Based Anomaly Detection.

tags | paper
MD5 | 5c667c43386d188500d20dc84401ef31
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
Android Flaw Lets Attack Code Slip Into Signed Apps
Posted Dec 9, 2017

tags | headline, malware, phone, flaw, google
Millions Stolen In NiceHash Bitcoin Heist
Posted Dec 9, 2017

tags | headline, hacker, cybercrime, fraud, cryptography
Apple HomeKit Flaw Left Smart Gadgets Vulnerable
Posted Dec 9, 2017

tags | headline, flaw, apple
Intel Management Engine Pwned By Buffer Overflow
Posted Dec 7, 2017

tags | headline, hacker, flaw, conference, intel
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close