Index of ftp://ftp.polinux.upv.es/viejo/pub/doc/ids

[DIR] Parent Directory

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 02 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->

[TXT] Advanced_Network_Defense_Research.pdf  180.61Kb  March 10 2002  [find mirrors]
[ GZ] An_Application_of_Pattern_Matching_in_Intrusion_Detection.ps.gz  163.48Kb  March 10 2002  [find mirrors]
[ GZ] An_Architecture_for_Intrusion_Detection_using_Autonomous_Agents.ps.gz  50.30Kb  March 10 2002  [find mirrors]
[TXT] An_Architecture_for_Protection_of_Network_Hosts_from_DoS_Attacks.pdf  305.04Kb  March 10 2002  [find mirrors]
[ GZ] An_Environment_for_Security_Protocol_Intrusion_Detection.ps.gz  235.47Kb  March 10 2002  [find mirrors]
[TXT] An_Eye_on_Network_Intruder-Administrator_Shootouts.pdf  185.06Kb  March 10 2002  [find mirrors]
[TXT] An_IDS_to_Mobile_Phone_Networks.pdf  211.94Kb  March 10 2002  [find mirrors]
[ GZ] An_Immunological_Approach_to_Change_Detection_Algorithms_Analysis_and_Implications.ps.gz  82.88Kb  March 10 2002  [find mirrors]
[ GZ] An_Immunological_Approach_to_Change_Detection_Theoretical_Results.ps.gz  51.97Kb  March 10 2002  [find mirrors]
[TGZ] An_Intelligent_Tutor_for_Intrusion_Detection_on_Computer_Systems.tgz  41.53Kb  March 10 2002  [find mirrors]
[ GZ] An_Introduction_to_Intrusion_Detection.ps.gz  65.61Kb  March 10 2002  [find mirrors]
[TXT] An_Introduction_to_Intrusion_Detection_and_Assessment.pdf  426.64Kb  March 10 2002  [find mirrors]
[TXT] An_Intrusion_Detection_Model.pdf  1.24Mb  March 10 2002  [find mirrors]
[ GZ] An_Intrusion_Tolerance_Approach_for_Protecting_Network_Infrastructures.ps.gz  279.86Kb  March 10 2002  [find mirrors]
[TXT] An_intrusion_detection_model.rtf  127.36Kb  March 10 2002  [find mirrors]
[TXT] Analysis_Techniques_for_Detecting_Coordinated_Attacks_and_Probes.pdf  137.67Kb  March 10 2002  [find mirrors]
[ GZ] Anomaly_Detection_over_Noisy_Data_Using_Learned_Probability_Distributions.ps.gz  47.66Kb  March 10 2002  [find mirrors]
[TXT] Application-Level_Isolation_Using_Data_Inconsistency_Detection.pdf  51.71Kb  March 10 2002  [find mirrors]
[TXT] Applying_CMAC-Based_On-line_Learning_to_Intrusion_Detection.pdf  51.17Kb  March 10 2002  [find mirrors]
[ GZ] Applying_Genetic_Programming_to_Intrusion_Detection.ps.gz  41.48Kb  March 10 2002  [find mirrors]
[TXT] Artificial_Immune_Systems_A_Survey_of_Applications.pdf  395.20Kb  March 10 2002  [find mirrors]
[ GZ] Artificial_Intelligence_and_Intrusion_Detection_Current_and_Future_Directions.ps.gz  46.48Kb  March 10 2002  [find mirrors]
[TXT] Artificial_Neural_Networks_for_Misuse_Detection.pdf  69.73Kb  March 10 2002  [find mirrors]
[ GZ] Automated_Audit_Trail_Analysis_and_Intrusion_Detection_A_Survey.ps.gz  56.45Kb  March 10 2002  [find mirrors]
[ GZ] Automated_Discovery_of_Concise_Predictive_Rules_for_Intrusion_Detection.ps.gz  225.86Kb  March 10 2002  [find mirrors]
[ GZ] Automated_Intrusion_Detection_Methods_using_NFR.ps.gz  44.05Kb  March 10 2002  [find mirrors]
[TXT] Automated_Intrusion_Detection_using_NFR_Methods_and_Experiences.pdf  57.76Kb  March 10 2002  [find mirrors]
[TXT] Automatic_Policy_Satisfaction_and_Verification_for_Intranet...pdf  216.94Kb  March 10 2002  [find mirrors]
[ GZ] Automatic_Policy_Satisfaction_and_Verification_for_Intranet_Wirde_Defense_Systems_Using_Signature_Based_Intrusion_Detection_and_Response_Systems.pdf.gz  191.90Kb  March 10 2002  [find mirrors]
[TXT] BOOTLOG.TXT  54.83Kb  March 10 2002  [find mirrors]

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 02 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->