Kau et al., 2005 - Google Patents
PERPOS Information AssuranceKau et al., 2005
- Document ID
- 13543337584148453526
- Author
- Kau J
- Nguyen S
- Publication year
External Links
- 238000007689 inspection 0 abstract description 59
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230362189A1 (en) | System and method for strategic anti-malware monitoring | |
| JP7250703B2 (en) | Assessment and remediation of correlation-driven threats | |
| Nawrocki et al. | A survey on honeypot software and data analysis | |
| Scarfone et al. | Guide to intrusion detection and prevention systems (idps) | |
| US10289857B1 (en) | Enforcement of same origin policy for sensitive data | |
| Scarfone et al. | Sp 800-94. guide to intrusion detection and prevention systems (idps) | |
| Karamanos | Investigation of home router security | |
| Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
| Frank Jr | Mirai bot scanner summation prototype | |
| Kau et al. | PERPOS Information Assurance | |
| Goebel | Advanced honeynet based intrusion detection | |
| Bhuyan et al. | Practical tools for attackers and defenders | |
| Magpayo et al. | Prevent a Wireless Attack | |
| ACK | NEW QUESTION | |
| Groen | Silent Sabotage: Identifying and Preventing Cyber Attacks from Inside Actors | |
| Singh et al. | Communication based vulnerabilities and script based solvabilities | |
| Cameron et al. | Juniper (r) Networks Secure Access SSL VPN Configuration Guide | |
| Singh et al. | Vulnerabilities of Electronics Communication: solution mechanism through script | |
| Samalekas | Network Forensics: Following the Digital Trail in a Virtual Environment | |
| Ibitola et al. | Analysis of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware | |
| Baskerville | Intrusion prevention systems: How do they prevent intrusion? | |
| Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
| Luan | Intrusion detection and management over the world wide web | |
| Bodó et al. | Experiences with IDS and Honeypots | |
| Fitzpatrick | Intrusion Detection and Security Assessment in a University Network |