Index of ftp://ftp.polinux.upv.es/viejo/pub/doc/ids

[DIR] Parent Directory

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 03 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->

[TXT] Benchmarking_Anomaly-Based_Detection_Systems.pdf  36.31Kb  March 10 2002  [find mirrors]
[TXT] Building_a_Network_Monitoring_and_Analysis_Capability.html  59.02Kb  March 10 2002  [find mirrors]
[ GZ] CEDMOS_Complex_Event_Detection_and_Monitoring_System.ps.gz  168.51Kb  March 10 2002  [find mirrors]
[ GZ] CIAC-2305_UNIX_Incident_Guide_How_to_Detect_an_Intrusion.pdf.gz  55.38Kb  March 10 2002  [find mirrors]
[ GZ] Classification_and_Detection_of_Computer_Intrusions.ps.gz  275.34Kb  March 10 2002  [find mirrors]
[ GZ] Compact_Recognizers_of_Episode_Events.ps.gz  60.02Kb  March 10 2002  [find mirrors]
[TXT] Computer_Intrusion_Detecting_Masquerades.pdf  571.15Kb  March 10 2002  [find mirrors]
[TXT] Computer_Intrusion_Detection_Based_on_Bayes_Factors_for_Comparing_Command_Transition_Probabilities.pdf  192.65Kb  March 10 2002  [find mirrors]
[ GZ] Continuous_Assessment_of_a_Unix_Configuration_Integrating_Intrusion_Detection_and_Configuration_Analysis.ps.gz  40.41Kb  March 10 2002  [find mirrors]
[ GZ] Data_Mining_Approaches_for_Intrusion_Detection.ps.gz  76.19Kb  March 10 2002  [find mirrors]
[TXT] Data_Mining_Methods_for_Detection_of_New_Malicious_Executables.pdf  154.13Kb  March 10 2002  [find mirrors]
[ GZ] Database_support_for_Intrusion_Detection.ps.gz  113.77Kb  March 10 2002  [find mirrors]
[ GZ] Deploying_Intrusion_Detection_Systems.html.gz  10.54Kb  March 10 2002  [find mirrors]
[TXT] Deploying_the_Shomiti_Century_Tap.pdf  133.09Kb  March 10 2002  [find mirrors]
[ GZ] Designing_a_web_of_highly-configurable_Intrusion_Detection_Sensors.ps.gz  83.71Kb  March 10 2002  [find mirrors]
[ GZ] Detecting_Anomalous_and_Unknown_Intrusions_Against_Programs.ps.gz  77.30Kb  March 10 2002  [find mirrors]
[ GZ] Detecting_Computer_and_Network_Misuse_through_the_Production-Based_expert_system_Toolset.pdf.gz  118.96Kb  March 10 2002  [find mirrors]
[ GZ] Detecting_Intruders_in_Computer_Systems.ps.gz  60.64Kb  March 10 2002  [find mirrors]
[ GZ] Detecting_Intrusions_using_System_Calls_Alternative_Data_Models.ps.gz  209.63Kb  March 10 2002  [find mirrors]
[TXT] Detecting_and_Displaying_Novel_Computer_Attacks_with_Macroscope.pdf  59.68Kb  March 10 2002  [find mirrors]
[ GZ] Detecting_the_Abnormal:Machine_Learning_in_Computer_Security.ps.gz  69.36Kb  March 10 2002  [find mirrors]
[TXT] Distributed_Metastasis_A_Computer_Network_Penetration_Methodology.pdf  63.25Kb  March 10 2002  [find mirrors]
[ GZ] Distributed_Tracing_of_Intruders.ps.gz  188.90Kb  March 10 2002  [find mirrors]
[TXT] Doing_intrusion_detection_using_embedded_sensors.pdf  238.44Kb  March 10 2002  [find mirrors]
[ GZ] EMERALD_Event_Monitoring_Enabling_Responses_to_Anomalous_Live_Disturbances.ps.gz  84.55Kb  March 10 2002  [find mirrors]
[TXT] Evaluating_an_Intrusion_Detection_Solution.pdf  98.46Kb  March 10 2002  [find mirrors]
[TXT] Event_Recognition_beyond_signature_and_anomaly.pdf  172.68Kb  March 10 2002  [find mirrors]
[ GZ] Experiences_with_Tripwire_Using_Integrity_Checkers_for_Intrusion_Detection.ps.gz  37.34Kb  March 10 2002  [find mirrors]
[ GZ] Fast_Multipattern_Search_Algorithms_for_Intrusion_Detection.ps.gz  81.32Kb  March 10 2002  [find mirrors]
[ GZ] GrIDS-A_Graph_Based_Intrusion_Detection_System_for_Large_Networks.ps.gz  81.68Kb  March 10 2002  [find mirrors]

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 03 of 07
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->