Index of ftp://ftp.polinux.upv.es/viejo/pub/doc/ids

[DIR] Parent Directory

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 01 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->

[ GZ] A_Change-Detection_Algorithm_Inspired_by_the_Immune_System.ps.gz  162.83Kb  March 10 2002
[ GZ] A_Common_Intrusion_Detection_Framework.ps.gz  100.78Kb  March 10 2002
[TXT] A_Comparative_Analysis_of_Current_Intrusion_Detection_Technologies.pdf  48.13Kb  March 10 2002
[ GZ] A_Comparison_of_Test_Statistics_for_Computer_Intrusion_Detection...ps.gz  70.11Kb  March 10 2002
[ GZ] A_Comprehensive_Simulation_Platform_for_Intrusion_Detection_in_Distributed_Systems.ps.gz  80.54Kb  March 10 2002
[ GZ] A_Distributed_Approach_to_Anomaly_Detection.ps.gz  382.82Kb  March 10 2002
[ GZ] A_Distributed_Concurrent_Intrusion_Detection_Scheme_based_on_assertions.ps.gz  70.91Kb  March 10 2002
[TXT] A_Domain-Specific_Language_for_Intrusion_Detection.pdf  262.08Kb  March 10 2002
[ GZ] A_Dynamic_Intrusion_Detection_Methodology.ps.gz  212.20Kb  March 10 2002
[TXT] A_Geometric_Framework_for_Unsupervised_Anomaly_Detection_Detecting_Intrusions_in_Unlabeled_Data.pdf  238.30Kb  March 10 2002
[TXT] A_Large-scale_Distributed_Intrusion_Detection_Framework_Based_on_Attack_Strategy_Analysis.pdf  165.10Kb  March 10 2002
[TXT] A_Logic-based_Knowledge_Representation_for_Authorization_with_Delegation.pdf  181.65Kb  March 10 2002
[ GZ] A_Methodology_for_Testing_Intrusion_Detection_Systems.ps.gz  110.38Kb  March 10 2002
[TXT] A_Methodology_for_Using_Intelligent_Agents_to_provide_automated_Intrusion_Response.pdf  65.82Kb  March 10 2002
[TXT] A_Model_for_an_Attack_Database_System.pdf  33.71Kb  March 10 2002
[ GZ] A_Pattern_Matching_Model_for_misuse_Intrusion_Detection.ps.gz  57.06Kb  March 10 2002
[ GZ] A_Quantitative_Model_of_the_Security_Intrusion_Process_Based_on_Attacker_Behavior.ps.gz  964.37Kb  March 10 2002
[TXT] A_Rule-based_Approach_for_PortScanning_Detection.pdf  43.34Kb  March 10 2002
[ GZ] A_Software_Architecture_to_support_Misuse_Intrusion_Detection.ps.gz  71.52Kb  March 10 2002
[TXT] A_Software_Platform_for_testing_IDS.pdf  1.14Mb  March 10 2002
[ GZ] A_Study_in_Using_Neural_Networks_for_Anomaly_and_Misuse_Detection.ps.gz  70.70Kb  March 10 2002
[TXT] A_Survey_of_Intrusion_Detection_Analysis_Methods.pdf  37.02Kb  March 10 2002
[ GZ] A_Visual_Mathematical_Model_for_Intrusion_Detection.pdf.gz  103.21Kb  March 10 2002
[TXT] A_conceptual_architecture_for_real-time_intrusion_monitoring.pdf  77.28Kb  March 10 2002
[TXT] A_glimpse_into_the_future_of_ID.pdf  57.40Kb  March 10 2002
[TXT] A_lightweight_tool_for_detecting_web_server_attacks.pdf  3.96Mb  March 10 2002
[TXT] Adaptation_Techniques_for_Intrusion_Detection_and_Intrusion_Response_Systems.pdf  37.13Kb  March 10 2002
[ GZ] Adaptive_Fraud_Detection.ps.gz  119.03Kb  March 10 2002
[TXT] Adaptive_Model_Generation_for_IDSes.pdf  71.45Kb  March 10 2002
[TXT] Advanced_Host_Detection.pdf  59.58Kb  March 10 2002

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 01 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->