what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 108 RSS Feed

Files

Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
Posted Nov 1, 2006

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

tags | paper
SHA-256 | d1e793eb894a058b611199b27ae1fdafbd3b6366813722d9d8a1243fd4743797
Connection-History-Based-Anomaly-Detection.pdf
Posted Nov 1, 2006

Connectionhistory Based Anomaly Detection.

tags | paper
SHA-256 | 83f53982d1f972a9de97b6bbee118e150b2b9cc20cd442db5d0cbe80d1947eb3
Correlating-Alerts-Using-Prerequistes-of-Intrusions.pdf
Posted Nov 1, 2006

Correlating Alerts Using Prerequistes of Intrusions.

tags | paper
SHA-256 | ae24469850810588568de08c56716ae14b11ebffca28d8fec3e3709cee2bebef
Detecting-Anomalous-Network-Traffic-with-Self-Organizing-Map.pdf
Posted Nov 1, 2006

Detecting Anomalous Network Traffic with Self Organizing Map.

tags | paper
SHA-256 | 35f6fc49f2f118b61a2578a290fcd7a9ea9b3a61e02de63de73b893e2c04f013
Detecting-Malicious-JavaScript-Code-in-Mozilla.pdf
Posted Nov 1, 2006

Detecting Malicious JavaScript Code in Mozilla.

tags | paper, javascript
SHA-256 | 3a373e1c5e410a6a7e90df53671d281a88a5bbb8ee22fdc81746ce1a45d4cecd
Detecting-Novel-Scans-Through-Pattern-Anomaly-Detection.pdf
Posted Nov 1, 2006

Detecting Novel Scans Through Pattern Anomaly Detection.

tags | paper
SHA-256 | d3e726f1d583edec97025376ab12655387592df58788e664a74b67c523d02c8e
Detecting-Viral-Propagations-Using-Email-Behaviour.pdf
Posted Nov 1, 2006

Detecting Viral Propagations Using Email Behaviour Profiles.

tags | paper
SHA-256 | fb23fc758f9af49e7aaa360c8c6d01a316f5fe608098b98afee3d5554ea0c21a
Honeycom.pdf
Posted Nov 1, 2006

Honeycom Creating Intrusion Detection Signatures Using Honeypots.

tags | paper
SHA-256 | 518c2a01e3a12bcb6fe7169f28045b828819c20792e624485680d057a721576b
ID-Using-Ensemble-of-Soft-Computing-Paradigms.pdf
Posted Nov 1, 2006

Intrusion Detection Using Ensemble of Soft Computing Paradigms.

tags | paper
SHA-256 | 7069ade49047a4207c350f03ea0890da5bcc4c30d828be44cbbf7d0909fe1e4a
ID-with-Unlabeled-Data-Using-Clustering.pdf
Posted Nov 1, 2006

Intrusion Detection with Unlabeled Data Using Clustering.

tags | paper
SHA-256 | 203845536bf8a4056ea75b4f291a54fe605f5d0b2ed60853813e4892fd0f1bfd
IDS-using-Adaptive-Regression-Splines.pdf
Posted Nov 1, 2006

Intrusion Detection Systems using Adaptive Regression Splines.

tags | paper
SHA-256 | 956e6e1661b5da940fea6539767e49bef41367e451013931d9150921faf5637d
Language-based-Generation-and-Evaluation-of-NIDS-Signatures.pdf
Posted Nov 1, 2006

Languagebased Generation and Evaluation of NIDS Signatures.

tags | paper
SHA-256 | ed8917fb1b075c6ef9358f527ebd1dba0e9d6f5b4b5c339a44ae8a888dd43a4c
Learning-Rules-for-Anomaly-Detection-of-Hostile-Network-Traffic.pdf
Posted Nov 1, 2006

Learning Rules for Anomaly Detection of Hostile Network Traffic.

tags | paper
SHA-256 | b2aaebaa3548816b97c1927df0307e400f856fe942ed9c0ea9e4851bd6ed1d6b
Mining_in_a_data-flow_environment_NIDS.pdf
Posted Nov 1, 2006

Mining in a data flow environment: Experience in Netowrk Intrusion Detection.

tags | paper
SHA-256 | 6b36a8e8324599436c06db8899c2e725fee6a7f5857d48a92f88f852924fe85c
Network-Traffic-Anomaly-Detection-based-on-Packet-Bytes.pdf
Posted Nov 1, 2006

Network Traffic Anomaly Detection based on Packet Bytes.

tags | paper
SHA-256 | 44a882e344b2cb8462f473b7cf05fc130df9b13bfae1aef6d5f0ee579305205e
NIDES-Summary.pdf
Posted Nov 1, 2006

Nextgeneration Instrusion Detection Expert System (NIDS): A summary.

tags | paper
SHA-256 | 645f03121cb6387442e2157e3b1bd44a82fd4f6457031eaad2c5d8c0869f4ecd
Polygraph.pdf
Posted Nov 1, 2006

Polygraph: Automatically Generating Signatures for Polymorphic Worms.

tags | paper, worm
SHA-256 | da1b41fe602bad7291c8016f7113690ea192d79e0a4c9eba51a3ca9c189192e9
Towards-Automatic-Generation-of-Vulnerability-Based-Signatures.pdf
Posted Nov 1, 2006

Towards Automatic Generation of Vulnerability Based Signatures.

tags | paper
SHA-256 | 523e5819d0299107dca236e8144187e014692025f0a1a3b3be8e4f35fb8af0b1
Towards-the-Scalable-Implementation-of-a-User-Level-Anomaly-Detection-System.pdf
Posted Nov 1, 2006

Towards the Scalable Implementation of a User Level Anomaly Detection System.

tags | paper
SHA-256 | 57f1dd6e0d045a13b818f2a473907674d803e83aea2a11ab9dd94be6b4941139
Undermining-Anomaly-based-IDS.pdf
Posted Nov 1, 2006

Undermining an Anomalybased Intrusion Detection System Using Common Exploits.

tags | paper
SHA-256 | b90399dd9a3cc0d592bd51c7120b738e541023f3f1c7418542dd0d85860168af
Using-Aritificial-Anomalies-to-Detect-Unknown-and-Known-Network-Intrusions.pdf
Posted Nov 1, 2006

Using Aritificial Anomalies to Detect Unknown and Known Network Intrusions.

tags | paper
SHA-256 | 3b377a761ba35262df65a76dd11b3dbc95ee7a4736d59ecf1eb8a64df9199939
Using-Program-Behavior.pdf
Posted Nov 1, 2006

Using Program Behavior for Intrusion Detection.

tags | paper
SHA-256 | 095e99067c52c8430859ca16f922ac5e9d525d0d3381bb91f5e9d21f45cf1521
A-Real-Time-IDS-based-on-Learning.pdf
Posted Nov 1, 2006

A RealTime Intrusion Detection System based on Learning Program Behavior.

tags | paper
SHA-256 | 0e8a47781283f6cc330dddf6e88f496211be2a23d3b455a2013438fb5378ecbb
An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Application of Machine Learning to Anomaly Detection.

tags | paper
SHA-256 | 382e3dd60f7bbf10b274abc609279cb4d359796893a194a890770cbccf87e701
An-Immunological-Approach-to-Change-Detection-Analysis.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.

tags | paper
SHA-256 | 9aa8bbbecb2de8548f2276bf36961313f1b9e3ab6748c5453b3acfc1b4efd985
Page 2 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close