what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 43 RSS Feed

Files

A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
Posted Nov 1, 2006

A comparative study of anomaly detection schemes in network intrusion detection.

tags | paper
SHA-256 | b9928e0c57d7fdc9212d412d47a979bfa6ae04da6fed4884e9c6313b71e3f0c1
A-Data-Mining-Framework-for-Building-IDS.pdf
Posted Nov 1, 2006

A Data Mining Framework for Building Intrusion Detection Models.

tags | paper
SHA-256 | 60d04b31fcfe448027bbb5860b8344475e331292a2f38a9c58a5f6bf8565794d
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
Posted Nov 1, 2006

A Framework For An Adaptive Intrusion Detection System with Data Mining.

tags | paper
SHA-256 | 8f6eb99f5161f3bdc97f1b2abc1790661385fcd2a732370cb3a64ad0d76ff3b4
A-Framework-for-Classifying-DoS-Attacks.pdf
Posted Nov 1, 2006

A Framework for Classifying Denial of Service Attacks.

tags | paper, denial of service
SHA-256 | 6bb2ae1d0f82b729c5207119d92f40b2d239e203a10af9bec1f54258ede9691e
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
Posted Nov 1, 2006

A Framework for Constructing Features and Models for Intrusion Detection Systems.

tags | paper
SHA-256 | f61527cf4af2510db8ad35437d3eb26e96999237907e12a510de0e49b2733a31
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
Posted Nov 1, 2006

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.

tags | paper
SHA-256 | 0449a5f802f6d128eb3b915c406f89489a0cd361eccb64aa70000c137ec98639
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
Posted Nov 1, 2006

A Learning Based Approach to the Detection of SQL Attacks.

tags | paper
SHA-256 | fb14d0903dcb142210d09d168d0e7272d143fb9ec59f4aea8414793dabf2f3d3
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

A Multimodel Approach to the Detection of Web-based Attacks.

tags | paper, web
SHA-256 | 9117f01a49f372f1077722bd13c30ab099dadef91785ce47ff698440299999b1
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
Posted Nov 1, 2006

ADAM: Detecting Intrusions by Data Mining.

tags | paper
SHA-256 | 365871b2726492c541c1128a5b7aa28e3b8f49a1efca1a45ea31c32a99328740
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
Posted Nov 1, 2006

Adaptive ModelBased Monitoring and Threat Detection.

tags | paper
SHA-256 | ffb2ace3c126a841b0995e6762b65668e80fa180369921ba297bf8a07215995c
Advanced-Polymorphic-Worms.pdf
Posted Nov 1, 2006

Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.

tags | paper, worm
SHA-256 | 172077357cd30fcc62e04169f1ec84f6a94d98bf29814df319b1c50ade80699a
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Analysis of 1999 DARPA for Network Anomaly Detection.

tags | paper
SHA-256 | d4666f6ffd4ce7a95bacc505648efa236a6525bb48d04ed5b62be09a89deaf2b
Anagram.pdf
Posted Nov 1, 2006

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.

tags | paper
SHA-256 | b8315ea07cf451e421585c010d3d279254f025a76e8535e1570373c64d43931c
ANN-for-Misuse-Detection.pdf
Posted Nov 1, 2006

Artificial Neural Networks for Misuse Detection.

tags | paper
SHA-256 | 453df9e792073f3916624b46fe6e9046520fa730ae9f4f767c0dd6fc2b1dbba3
Anomalous-Payload-based-NIDS.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Network Intrusion Detection.

tags | paper
SHA-256 | 9c25b1fec06554bffaf334517971c4cb2970439182656787fe2c7be234ba7537
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Worm Detection and Signature Generation.

tags | paper, worm
SHA-256 | 1a316e80a29f60a55607e500d38fbace3e0c8aa7b2006af81a622cbbe5f4d5c0
Anomaly-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

Anomaly Detection of Webbased Attacks.

tags | paper
SHA-256 | c369809658f5a0f07f13ac5ff735d08a77fc9ec3cf8423f28b77e5130f59be51
Application-of-ANN-to-Misuse-Detection.pdf
Posted Nov 1, 2006

Application of Artiticial Neural Network to Misuse Detection: Initial Results.

tags | paper
SHA-256 | ad265ece6bdbe90f06722c37a8c536e35747fae08fb3245b7017a1639611694e
Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
SHA-256 | b35c688d5912ca6b3d789328c4e4a6e187a7d8c3ef95b11e1529030e8287538d
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
SHA-256 | 0cb4a3046f7bf52bd0b79c0cbfe693b088d13cc12fc0289d06e30e18c8114e8c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
SHA-256 | ad80f2bb538c68b96ee709af75a70a2fae32e56977d7f19e998361089e52922d
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
SHA-256 | a6a812761c18136a77155455be3a7647d70dec890681e1d874f2143672587d31
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
SHA-256 | 2af73f0d81a7be88804e65be8fc333406c2fbbd53f394f35f29fe3432578771f
Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
Posted Nov 1, 2006

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

tags | paper
SHA-256 | d1e793eb894a058b611199b27ae1fdafbd3b6366813722d9d8a1243fd4743797
Connection-History-Based-Anomaly-Detection.pdf
Posted Nov 1, 2006

Connectionhistory Based Anomaly Detection.

tags | paper
SHA-256 | 83f53982d1f972a9de97b6bbee118e150b2b9cc20cd442db5d0cbe80d1947eb3
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close