Intrusions

Detecting intrusion with rule-based integration of multiple models Sang-Jun Han and Sung-Bae Cho 2008 668 11
Intrusions and their Detection: Addressing Common Hacker Exploits Brad C. Johnson 2005 225 5  
GP Ensemble for Distributed Intrusion Detection Systems Gianluigi Folino, Clara Pizzuti and Giandomenico Spezzano 2008 145 9  
Intrusion Detection Techniques Peng Ning, Sushil Jajodia 2008 514 13  
The New Face of Intrusion Prevention Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price 2009 3987 10  
MessageLabs Intelligence: July 2008Google Sites Becomes Newest Addition to Spammers Arsenal 2008 2813 10  
Network vulnerability scanning, patch management and auditing 2008 28 1  
Optimizing WAN Performance for the Global Enterprise May 2006 296 12  
A Clustering Algorithm for Intrusion Detection Qiang Wang Vasileios Megalooikonomou 2008 118 8  
Software Decoys: Intrusion Detection and Countermeasures 2002 96 9  
Windows Intruder Detection Checklist 2006 81 15