Intrusions
Ссылка
Дата
Объем в кбайтах
Число страниц
Справка
Detecting intrusion with rule-based integration of multiple models
Sang-Jun Han and Sung-Bae Cho
2008
668
11
Описание различных методов вторжений и методов их детектирования
Intrusions and their Detection: Addressing Common Hacker Exploits
Brad C. Johnson
2005
225
5
GP Ensemble for Distributed Intrusion Detection Systems
Gianluigi Folino, Clara Pizzuti and Giandomenico Spezzano
2008
145
9
Intrusion Detection Techniques
Peng Ning, Sushil Jajodia
2008
514
13
The New Face of Intrusion Prevention
Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price
2009
3987
10
MessageLabs Intelligence: July 2008“Google Sites Becomes Newest Addition to Spammers’ Arsenal”
Огдн 2008
2813
10
Network vulnerability scanning, patch management and auditing
2008
28
1
Optimizing WAN Performance for the Global Enterprise
May 2006
296
12
A Clustering Algorithm for Intrusion Detection
Qiang Wang Vasileios Megalooikonomou
2008
118
8
Software Decoys: Intrusion Detection and Countermeasures
2002
96
9
Windows Intruder Detection Checklist
2006
81
15