[go: up one dir, main page]

Kau et al., 2005 - Google Patents

PERPOS Information Assurance

Kau et al., 2005

Document ID
13543337584148453526
Author
Kau J
Nguyen S
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Similar Documents

Publication Publication Date Title
US20230362189A1 (en) System and method for strategic anti-malware monitoring
JP7250703B2 (en) Assessment and remediation of correlation-driven threats
Nawrocki et al. A survey on honeypot software and data analysis
Scarfone et al. Guide to intrusion detection and prevention systems (idps)
US10289857B1 (en) Enforcement of same origin policy for sensitive data
Scarfone et al. Sp 800-94. guide to intrusion detection and prevention systems (idps)
Karamanos Investigation of home router security
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Frank Jr Mirai bot scanner summation prototype
Kau et al. PERPOS Information Assurance
Goebel Advanced honeynet based intrusion detection
Bhuyan et al. Practical tools for attackers and defenders
Magpayo et al. Prevent a Wireless Attack
ACK NEW QUESTION
Groen Silent Sabotage: Identifying and Preventing Cyber Attacks from Inside Actors
Singh et al. Communication based vulnerabilities and script based solvabilities
Cameron et al. Juniper (r) Networks Secure Access SSL VPN Configuration Guide
Singh et al. Vulnerabilities of Electronics Communication: solution mechanism through script
Samalekas Network Forensics: Following the Digital Trail in a Virtual Environment
Ibitola et al. Analysis of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware
Baskerville Intrusion prevention systems: How do they prevent intrusion?
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Luan Intrusion detection and management over the world wide web
Bodó et al. Experiences with IDS and Honeypots
Fitzpatrick Intrusion Detection and Security Assessment in a University Network