language:
Find link is a tool written by Edward Betts.Longer titles found: Intrusion detection system evasion techniques (view), Host-based intrusion detection system (view), Application protocol-based intrusion detection system (view), Anomaly-based intrusion detection system (view), Protocol-based intrusion detection system (view), Host-based intrusion detection system comparison (view), Linux Intrusion Detection System (view)
searching for Intrusion detection system 53 found (178 total)
alternate case: intrusion detection system
Wireless intrusion prevention system
(848 words)
[view diff]
exact match in snippet
view article
find links to article
automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorizedPerimeter intrusion detection (310 words) [view diff] exact match in snippet view article find links to article
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeterVern Paxson (248 words) [view diff] exact match in snippet view article find links to article
the original author of the flex lexical analyzer and the Zeek intrusion detection system. Backscatter is a term coined by Vern Paxson to describe InternetChristien Rioux (394 words) [view diff] exact match in snippet view article find links to article
auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. He is also a member of Cult of the Dead Cow and its Ninja StrikeWheelGroup (146 words) [view diff] exact match in snippet view article find links to article
company developed and sold the first[citation needed] commercial intrusion detection system, NetRanger, which was eventually re-branded as Cisco Systems AdaptiveNetwork Chemistry (179 words) [view diff] exact match in snippet view article find links to article
company sold products such as RFprotect Distributed, a wireless intrusion detection system; RFprotect Endpoint, a laptop security product; and RFprotectPeter G. Neumann (536 words) [view diff] exact match in snippet view article find links to article
worked with Dorothy E. Denning in the 1980s to develop a computer intrusion detection system known as IDES that was a model for later computer security softwareStephanie Forrest (684 words) [view diff] no match in snippet view article find links to article
the 1990s has included "developing the first practical anomaly intrusion-detection system; designing automated responses to cyberattacks; writing an earlyFail2ban (717 words) [view diff] no match in snippet view article find links to article
approach to spam mitigation. OSSEC, an open-source host-based intrusion-detection system. "Release 1.1.0". 25 April 2024. Retrieved 23 May 2024. BledsoeEvasion (network security) (523 words) [view diff] case mismatch in snippet view article
network security devices. Metasploit Project 50 Ways to Defeat Your Intrusion Detection System Ptacek, Newsham: Insertion, Evasion, and Denial of Service: EludingAutomatic train operation (2,910 words) [view diff] exact match in snippet view article find links to article
de. Ausgabe 10/2021. "Advanced integrated obstacle and track intrusion detection system for smart automation of rail transport". CORDIS. Archived fromBiswanath Mukherjee (1,119 words) [view diff] exact match in snippet view article find links to article
Communications Surveys & Tutorials. First proposal/prototype for a network intrusion detection system (1990): L. Todd Heberlein, B. Mukherjee, et al., "A Network SecurityNorbert Pohlmann (476 words) [view diff] case mismatch in snippet view article find links to article
Internet und Intranet, E-Mail-Security, Virtual Private Network, Intrusion Detection System, Personal Firewalls MITP-Verlag, Bonn 2003 ISBN 3-8266-0988-3Homeland Open Security Technology (591 words) [view diff] exact match in snippet view article find links to article
Department of Homeland Security. Suricata - An open source-based intrusion detection system (IDS). It was developed by the Open Information Security FoundationEndian Firewall (1,048 words) [view diff] case mismatch in snippet view article find links to article
Uplink Failover Firewall (both directions) Demilitarized Zone Intrusion Detection System / Intrusion Prevention System Web-, FTP- and E-Mail-antivirusOBIX (1,131 words) [view diff] case mismatch in snippet view article find links to article
day-time mode until 9:30. The guard may also need to disable the (2) Intrusion Detection System during that period. Call Maintenance to make sure the room's (3)False alarm (1,403 words) [view diff] case mismatch in snippet view article find links to article
Multiview Approach for Reduction of False alarm rate in Network Intrusion Detection System" (PDF). p. 11. Archived from the original (PDF) on 2017-04-06United States Penitentiary, Allenwood (1,262 words) [view diff] exact match in snippet view article find links to article
between the fences. The inner fence is equipped with a perimeter intrusion detection system and a road for patrol vehicles runs along the outer fence. CorrectionMartin Roesch (364 words) [view diff] case mismatch in snippet view article find links to article
"So, What Is Snort? | An Introduction to Snort: A Lightweight Intrusion Detection System | InformIT". www.informit.com. Retrieved 2023-01-13. "CybersecurityMartin Roesch (364 words) [view diff] case mismatch in snippet view article find links to article
"So, What Is Snort? | An Introduction to Snort: A Lightweight Intrusion Detection System | InformIT". www.informit.com. Retrieved 2023-01-13. "CybersecurityFuture Fibre Technologies (428 words) [view diff] exact match in snippet view article find links to article
technology were commercialised in 2002, providing a fiber optic sensor intrusion detection system with the capacity to detect a perimeter intrusion to within 25 metresPing of death (1,090 words) [view diff] case mismatch in snippet view article find links to article
Smurf attack Abdollahi, Asrin; Fathi, Mohammad (2020-01-23). "An Intrusion Detection System on Ping of Death Attacks in IoT Networks". Wireless Personal CommunicationsCybersecurity and Infrastructure Security Agency (2,040 words) [view diff] exact match in snippet view article find links to article
executive branch and US-based entities. CISA manages the EINSTEIN intrusion detection system to detect malicious activity on federal government agency networksInternet traffic (2,377 words) [view diff] exact match in snippet view article find links to article
the original on June 13, 2008. Retrieved 21 October 2014. Bro intrusion detection system – Bro overview, http://bro-ids.org, as of August 14, 2007. V.Computer case (2,844 words) [view diff] exact match in snippet view article find links to article
report this event the next time it is powered on. This physical intrusion detection system may help computer owners detect tampering with their computersNational Cyber Security Division (1,308 words) [view diff] exact match in snippet view article find links to article
operationally known as EINSTEIN. The EINSTEIN Program is an automated intrusion detection system for collecting, correlating, analyzing, and sharing computer securityElectronic business (3,426 words) [view diff] exact match in snippet view article find links to article
or internet protocol security. Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companiesWilliam H. Robinson (797 words) [view diff] exact match in snippet view article find links to article
Richard A.; Robinson, William H. (2010-05-01). "A distributed intrusion detection system for resource-constrained devices in ad-hoc networks". Ad Hoc NetworksPunggol LRT line (5,607 words) [view diff] exact match in snippet view article find links to article
the East Loop, SBS Transit has implemented the VAnGuard track intrusion detection system on the SPLRT to enhance safety. Using video analytics and artificialOklahoma State Reformatory (1,545 words) [view diff] case mismatch in snippet view article find links to article
interior. These wires are linked up to an Intrepid Micro-Point Intrusion Detection system, monitored by the central control room, which detects vibrationsSengkang LRT line (6,241 words) [view diff] exact match in snippet view article find links to article
enhance safety, SBS Transit has implemented the VAnGuard track intrusion detection system on the SPLRT. Using video analytics and artificial intelligenceIMSI-catcher (2,155 words) [view diff] case mismatch in snippet view article find links to article
MicroNet-U: Proximus LLC UMTS catcher iParanoid: IMSI Catcher Intrusion Detection System presentation Vulnerability by Design in Mobile Network SecurityAbhaya Induruwa (2,400 words) [view diff] case mismatch in snippet view article find links to article
for the development of the ICT industry in Sri Lanka "Hybrid Intrusion Detection System for Smart Home Applications" (Chapter 12) in Developing and MonitoringCairn India (2,907 words) [view diff] case mismatch in snippet view article find links to article
The pipeline also incorporates the first of its kind Pipeline Intrusion Detection System. This provides security along the entire length, utilising a fibreHugo Teufel III (1,519 words) [view diff] exact match in snippet view article find links to article
a privacy impact assessment of Einstein 2, a computer network intrusion detection system designed for deployment within federal executive agencies forList of applications using Lua (2,131 words) [view diff] exact match in snippet view article find links to article
New versions of SciTE editor can be extended using Lua. Snort intrusion detection system includes a Lua interpreter since 3.0 beta release. The SqueezeboxUbon Royal Thai Air Force Base (3,651 words) [view diff] exact match in snippet view article find links to article
1982nd Radio Maintenance section maintained the electronic sensor intrusion detection system on the perimeters of both the base and the bomb dump. It was alsoTrend Micro (4,230 words) [view diff] case mismatch in snippet view article find links to article
engineering firm) was announced to jointly introduce and deploy the Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) to secure networkedPica8 (1,148 words) [view diff] exact match in snippet view article find links to article
controller, a programmable network tap, an open-source network intrusion detection system, and other components meant to give customers a complete SDN solution[buzzword]Promethium (4,980 words) [view diff] case mismatch in snippet view article find links to article
operation, and checkout procedures for Joint-Services Interior Intrusion Detection System (J-SIIDS). Headquarters, Departments of the Army, Navy, and AirMcAfee (5,972 words) [view diff] no match in snippet view article find links to article
blocking them. The IntruVert product line can be used as a passive intrusion-detection system, just watching and reporting, or it can be used in the intrusion-preventionList of Singapore LRT stations (2,310 words) [view diff] exact match in snippet view article find links to article
pencerobohan landasan LRT perkukuh keselamatan penumpang" [LRT track intrusion detection system strengthens passenger safety] (in Malay). 4 March 2024. ArchivedMeasurement and signature intelligence (4,932 words) [view diff] case mismatch in snippet view article find links to article
Sandia National Laboratories, which subsequently designed the Mini Intrusion Detection System (MIDS) family, and the U.S. Marine Corps's AN/GSQ-261 TacticalAli Dehghantanha (1,598 words) [view diff] case mismatch in snippet view article find links to article
has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryptionRMAF Special Forces (4,827 words) [view diff] case mismatch in snippet view article find links to article
operations. For area protection, the squadron uses the Field Intrusion Detection System (FIDS). Prior to 2021, this unit was known as the Field ProtectionYuval Elovici (2,673 words) [view diff] exact match in snippet view article find links to article
devices using SELinux and developing several prototypes of an intrusion detection system (IDS) for strengthening Android-based devices based on variousTaipei Metro (8,374 words) [view diff] case mismatch in snippet view article find links to article
other lines, were equipped with platform screen doors. A Track Intrusion Detection System had also been installed to improve passenger safety at stationsKashiwazaki-Kariwa Nuclear Power Plant (5,835 words) [view diff] exact match in snippet view article find links to article
TEPCO plans to implement anti-terrorism measures, install an intrusion detection system, and hire an additional 30 guards to protect nuclear materialToronto subway (13,193 words) [view diff] exact match in snippet view article find links to article
along the line The light-rail Line 5 Eglinton will use a guideway intrusion detection system (GIDS) to detect trespassers on the tracks on the undergroundNicholas Carlini (1,309 words) [view diff] case mismatch in snippet view article find links to article
Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack". 2022 IEEE InternationalLine 5 Eglinton (16,403 words) [view diff] exact match in snippet view article find links to article
allowing for a change of direction. Line 5 will use a guideway intrusion detection system (GIDS) to detect trespassers on the tracks on the undergroundList of military electronics of the United States (11,784 words) [view diff] case mismatch in snippet view article find links to article
153 MHz (2.17 to 1.96 m). US Marine Corps AN/GSQ-259 Miniature Intrusion Detection System (MIDS) attended ground sensor system operating from 143.6 to 143Optuna (2,789 words) [view diff] case mismatch in snippet view article find links to article
; Jayaseeli, J. D. Dorathi; Robert, P. (2024-12-17). "Network Intrusion Detection System Using Optuna". 2024 International Conference on IoT Based Control