Evaluation of the diagnostic capabilities of commercial intrusion detection systems

被引:0
|
作者
France Télécom R and D, 42 rue des Coutures, Caen [1 ]
F-14000, France
机构
来源
Lect. Notes Comput. Sci. | / 177-198期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection - Testing - Malware
引用
收藏
相关论文
共 50 条
  • [1] On the credibility of wireless sensor network simulations: Evaluation of intrusion detection system
    Faculty of Informatics, Masaryk University, Czech Republic
    SIMUTools - Int. Conf. Simul. Tools Techniques, (75-84):
  • [2] Usability evaluation using specialized heuristics with qualitative indicators for intrusion detection system
    Patil, Tulsidas
    Bhutkar, Ganesh
    Tarapore, Noshir
    Advances in Intelligent Systems and Computing, 2012, 176 AISC (VOL. 1): : 317 - 328
  • [3] Mobile agents for computer intrusion detection
    Foo, Simon Y.
    Arradondo, Michael
    Proc Annu Southeast Symp Syst Theory, 1600, (517-521):
  • [4] Anomaly intrusion detection in dynamic execution environments
    Inoue, Hajime
    Forrest, Stephanie
    Proceedings New Security Paradigms Workshop, 2002, : 52 - 60
  • [5] Saudi experience: Leak-detection systems need careful evaluation
    Genta, Pablo D.
    Oil and Gas Journal, 2005, 103 (25) : 74 - 80
  • [6] Analysis of the Capabilities of Embedded Systems in Intraprediction Video Coding
    Miguelez-Tercero, Ruben
    Jimenez-Ruiz, Alberto
    Ruiz, Damian
    Fernandez-Escribano, Gerardo
    Cuenca, Pedro
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (05) : 25 - 40
  • [7] Accelerating Innovation: Capabilities and Systems Beyond Organizational Boundaries
    Bellis, Paola
    Magnusson, Mats
    Nilsson, Susanne
    Samuelsson, Mikael
    RESEARCH-TECHNOLOGY MANAGEMENT, 2024, 67 (04) : 9 - 13
  • [8] Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier
    Pradeepthi, C.
    Maheswari, B. Uma
    Multimedia Tools and Applications, 2024, 83 (13) : 40147 - 40178
  • [9] Watershed and river systems management program: Overview of capabilities
    Frevert, Donald
    Fulp, Terrance
    Zagona, Edith
    Leavesley, George
    Lins, Harry
    J. Irrig. Drain. Eng., 2 (92-97):
  • [10] Intrusion Detection Using Rule Based Approach in RPL Networks
    Belavagi, Manjula C
    Muniyal, Balachandra
    IAENG International Journal of Computer Science, 2023, 50 (03)