Intrusions

СсылкаДатаОбъем в кбайтахЧисло страницСправка
Detecting intrusion with rule-based integration of multiple models Sang-Jun Han and Sung-Bae Cho 2008 668 11 Описание различных методов вторжений и методов их детектирования
Intrusions and their Detection: Addressing Common Hacker Exploits Brad C. Johnson 2005 225 5  
GP Ensemble for Distributed Intrusion Detection Systems Gianluigi Folino, Clara Pizzuti and Giandomenico Spezzano 2008 145 9  
Intrusion Detection Techniques Peng Ning, Sushil Jajodia 2008 514 13  
The New Face of Intrusion Prevention Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price 2009 3987 10  
MessageLabs Intelligence: July 2008“Google Sites Becomes Newest Addition to Spammers’ Arsenal” Огдн 2008 2813 10  
Network vulnerability scanning, patch management and auditing 2008 28 1  
Optimizing WAN Performance for the Global Enterprise May 2006 296 12  
A Clustering Algorithm for Intrusion Detection Qiang Wang Vasileios Megalooikonomou 2008 118 8  
Software Decoys: Intrusion Detection and Countermeasures 2002 96 9  
Windows Intruder Detection Checklist 2006 81 15