Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Intrusion detection system evasion techniques (view), Host-based intrusion detection system (view), Application protocol-based intrusion detection system (view), Anomaly-based intrusion detection system (view), Protocol-based intrusion detection system (view), Host-based intrusion detection system comparison (view), Linux Intrusion Detection System (view)

searching for Intrusion detection system 53 found (178 total)

alternate case: intrusion detection system

Wireless intrusion prevention system (848 words) [view diff] exact match in snippet view article find links to article

automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized
Perimeter intrusion detection (310 words) [view diff] exact match in snippet view article find links to article
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter
Vern Paxson (248 words) [view diff] exact match in snippet view article find links to article
the original author of the flex lexical analyzer and the Zeek intrusion detection system. Backscatter is a term coined by Vern Paxson to describe Internet
Christien Rioux (394 words) [view diff] exact match in snippet view article find links to article
auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. He is also a member of Cult of the Dead Cow and its Ninja Strike
WheelGroup (146 words) [view diff] exact match in snippet view article find links to article
company developed and sold the first[citation needed] commercial intrusion detection system, NetRanger, which was eventually re-branded as Cisco Systems Adaptive
Network Chemistry (179 words) [view diff] exact match in snippet view article find links to article
company sold products such as RFprotect Distributed, a wireless intrusion detection system; RFprotect Endpoint, a laptop security product; and RFprotect
Peter G. Neumann (536 words) [view diff] exact match in snippet view article find links to article
worked with Dorothy E. Denning in the 1980s to develop a computer intrusion detection system known as IDES that was a model for later computer security software
Stephanie Forrest (684 words) [view diff] no match in snippet view article find links to article
the 1990s has included "developing the first practical anomaly intrusion-detection system; designing automated responses to cyberattacks; writing an early
Fail2ban (717 words) [view diff] no match in snippet view article find links to article
approach to spam mitigation. OSSEC, an open-source host-based intrusion-detection system. "Release 1.1.0". 25 April 2024. Retrieved 23 May 2024. Bledsoe
Evasion (network security) (523 words) [view diff] case mismatch in snippet view article
network security devices. Metasploit Project 50 Ways to Defeat Your Intrusion Detection System Ptacek, Newsham: Insertion, Evasion, and Denial of Service: Eluding
Automatic train operation (2,910 words) [view diff] exact match in snippet view article find links to article
de. Ausgabe 10/2021. "Advanced integrated obstacle and track intrusion detection system for smart automation of rail transport". CORDIS. Archived from
Biswanath Mukherjee (1,119 words) [view diff] exact match in snippet view article find links to article
Communications Surveys & Tutorials. First proposal/prototype for a network intrusion detection system (1990): L. Todd Heberlein, B. Mukherjee, et al., "A Network Security
Norbert Pohlmann (476 words) [view diff] case mismatch in snippet view article find links to article
Internet und Intranet, E-Mail-Security, Virtual Private Network, Intrusion Detection System, Personal Firewalls MITP-Verlag, Bonn 2003 ISBN 3-8266-0988-3
Homeland Open Security Technology (591 words) [view diff] exact match in snippet view article find links to article
Department of Homeland Security. Suricata - An open source-based intrusion detection system (IDS). It was developed by the Open Information Security Foundation
Endian Firewall (1,048 words) [view diff] case mismatch in snippet view article find links to article
Uplink Failover Firewall (both directions) Demilitarized Zone Intrusion Detection System / Intrusion Prevention System Web-, FTP- and E-Mail-antivirus
OBIX (1,131 words) [view diff] case mismatch in snippet view article find links to article
day-time mode until 9:30. The guard may also need to disable the (2) Intrusion Detection System during that period. Call Maintenance to make sure the room's (3)
False alarm (1,403 words) [view diff] case mismatch in snippet view article find links to article
Multiview Approach for Reduction of False alarm rate in Network Intrusion Detection System" (PDF). p. 11. Archived from the original (PDF) on 2017-04-06
United States Penitentiary, Allenwood (1,262 words) [view diff] exact match in snippet view article find links to article
between the fences. The inner fence is equipped with a perimeter intrusion detection system and a road for patrol vehicles runs along the outer fence. Correction
Martin Roesch (364 words) [view diff] case mismatch in snippet view article find links to article
"So, What Is Snort? | An Introduction to Snort: A Lightweight Intrusion Detection System | InformIT". www.informit.com. Retrieved 2023-01-13. "Cybersecurity
Martin Roesch (364 words) [view diff] case mismatch in snippet view article find links to article
"So, What Is Snort? | An Introduction to Snort: A Lightweight Intrusion Detection System | InformIT". www.informit.com. Retrieved 2023-01-13. "Cybersecurity
Future Fibre Technologies (428 words) [view diff] exact match in snippet view article find links to article
technology were commercialised in 2002, providing a fiber optic sensor intrusion detection system with the capacity to detect a perimeter intrusion to within 25 metres
Ping of death (1,090 words) [view diff] case mismatch in snippet view article find links to article
Smurf attack Abdollahi, Asrin; Fathi, Mohammad (2020-01-23). "An Intrusion Detection System on Ping of Death Attacks in IoT Networks". Wireless Personal Communications
Cybersecurity and Infrastructure Security Agency (2,040 words) [view diff] exact match in snippet view article find links to article
executive branch and US-based entities. CISA manages the EINSTEIN intrusion detection system to detect malicious activity on federal government agency networks
Internet traffic (2,377 words) [view diff] exact match in snippet view article find links to article
the original on June 13, 2008. Retrieved 21 October 2014. Bro intrusion detection system – Bro overview, http://bro-ids.org, as of August 14, 2007. V.
Computer case (2,844 words) [view diff] exact match in snippet view article find links to article
report this event the next time it is powered on. This physical intrusion detection system may help computer owners detect tampering with their computers
National Cyber Security Division (1,308 words) [view diff] exact match in snippet view article find links to article
operationally known as EINSTEIN. The EINSTEIN Program is an automated intrusion detection system for collecting, correlating, analyzing, and sharing computer security
Electronic business (3,426 words) [view diff] exact match in snippet view article find links to article
or internet protocol security. Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companies
William H. Robinson (797 words) [view diff] exact match in snippet view article find links to article
Richard A.; Robinson, William H. (2010-05-01). "A distributed intrusion detection system for resource-constrained devices in ad-hoc networks". Ad Hoc Networks
Punggol LRT line (5,607 words) [view diff] exact match in snippet view article find links to article
the East Loop, SBS Transit has implemented the VAnGuard track intrusion detection system on the SPLRT to enhance safety. Using video analytics and artificial
Oklahoma State Reformatory (1,545 words) [view diff] case mismatch in snippet view article find links to article
interior. These wires are linked up to an Intrepid Micro-Point Intrusion Detection system, monitored by the central control room, which detects vibrations
Sengkang LRT line (6,241 words) [view diff] exact match in snippet view article find links to article
enhance safety, SBS Transit has implemented the VAnGuard track intrusion detection system on the SPLRT. Using video analytics and artificial intelligence
IMSI-catcher (2,155 words) [view diff] case mismatch in snippet view article find links to article
MicroNet-U: Proximus LLC UMTS catcher iParanoid: IMSI Catcher Intrusion Detection System presentation Vulnerability by Design in Mobile Network Security
Abhaya Induruwa (2,400 words) [view diff] case mismatch in snippet view article find links to article
for the development of the ICT industry in Sri Lanka "Hybrid Intrusion Detection System for Smart Home Applications" (Chapter 12) in Developing and Monitoring
Cairn India (2,907 words) [view diff] case mismatch in snippet view article find links to article
The pipeline also incorporates the first of its kind Pipeline Intrusion Detection System. This provides security along the entire length, utilising a fibre
Hugo Teufel III (1,519 words) [view diff] exact match in snippet view article find links to article
a privacy impact assessment of Einstein 2, a computer network intrusion detection system designed for deployment within federal executive agencies for
List of applications using Lua (2,131 words) [view diff] exact match in snippet view article find links to article
New versions of SciTE editor can be extended using Lua. Snort intrusion detection system includes a Lua interpreter since 3.0 beta release. The Squeezebox
Ubon Royal Thai Air Force Base (3,651 words) [view diff] exact match in snippet view article find links to article
1982nd Radio Maintenance section maintained the electronic sensor intrusion detection system on the perimeters of both the base and the bomb dump. It was also
Trend Micro (4,230 words) [view diff] case mismatch in snippet view article find links to article
engineering firm) was announced to jointly introduce and deploy the Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) to secure networked
Pica8 (1,148 words) [view diff] exact match in snippet view article find links to article
controller, a programmable network tap, an open-source network intrusion detection system, and other components meant to give customers a complete SDN solution[buzzword]
Promethium (4,980 words) [view diff] case mismatch in snippet view article find links to article
operation, and checkout procedures for Joint-Services Interior Intrusion Detection System (J-SIIDS). Headquarters, Departments of the Army, Navy, and Air
McAfee (5,972 words) [view diff] no match in snippet view article find links to article
blocking them. The IntruVert product line can be used as a passive intrusion-detection system, just watching and reporting, or it can be used in the intrusion-prevention
List of Singapore LRT stations (2,310 words) [view diff] exact match in snippet view article find links to article
pencerobohan landasan LRT perkukuh keselamatan penumpang" [LRT track intrusion detection system strengthens passenger safety] (in Malay). 4 March 2024. Archived
Measurement and signature intelligence (4,932 words) [view diff] case mismatch in snippet view article find links to article
Sandia National Laboratories, which subsequently designed the Mini Intrusion Detection System (MIDS) family, and the U.S. Marine Corps's AN/GSQ-261 Tactical
Ali Dehghantanha (1,598 words) [view diff] case mismatch in snippet view article find links to article
has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption
RMAF Special Forces (4,827 words) [view diff] case mismatch in snippet view article find links to article
operations. For area protection, the squadron uses the Field Intrusion Detection System (FIDS). Prior to 2021, this unit was known as the Field Protection
Yuval Elovici (2,673 words) [view diff] exact match in snippet view article find links to article
devices using SELinux and developing several prototypes of an intrusion detection system (IDS) for strengthening Android-based devices based on various
Taipei Metro (8,374 words) [view diff] case mismatch in snippet view article find links to article
other lines, were equipped with platform screen doors. A Track Intrusion Detection System had also been installed to improve passenger safety at stations
Kashiwazaki-Kariwa Nuclear Power Plant (5,835 words) [view diff] exact match in snippet view article find links to article
TEPCO plans to implement anti-terrorism measures, install an intrusion detection system, and hire an additional 30 guards to protect nuclear material
Toronto subway (13,193 words) [view diff] exact match in snippet view article find links to article
along the line The light-rail Line 5 Eglinton will use a guideway intrusion detection system (GIDS) to detect trespassers on the tracks on the underground
Nicholas Carlini (1,309 words) [view diff] case mismatch in snippet view article find links to article
Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack". 2022 IEEE International
Line 5 Eglinton (16,403 words) [view diff] exact match in snippet view article find links to article
allowing for a change of direction. Line 5 will use a guideway intrusion detection system (GIDS) to detect trespassers on the tracks on the underground
List of military electronics of the United States (11,784 words) [view diff] case mismatch in snippet view article find links to article
153 MHz (2.17 to 1.96 m). US Marine Corps AN/GSQ-259 Miniature Intrusion Detection System (MIDS) attended ground sensor system operating from 143.6 to 143
Optuna (2,789 words) [view diff] case mismatch in snippet view article find links to article
; Jayaseeli, J. D. Dorathi; Robert, P. (2024-12-17). "Network Intrusion Detection System Using Optuna". 2024 International Conference on IoT Based Control