Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Results of classroom enterprise security assessment of five large enterprise networks
Journal of Computing Sciences in Colleges
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
A web-based system for intrusion detection
Journal of Computing Sciences in Colleges
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Evaluation of Intrusion Detection Systems Under a Resource Constraint
ACM Transactions on Information and System Security (TISSEC)
Sensing Attacks in Computers Networks with Hidden Markov Models
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
A Component-Based Framework for Visualization of Intrusion Detection Events
Information Security Journal: A Global Perspective
Ensemble of classifiers for detecting network intrusion
Proceedings of the International Conference on Advances in Computing, Communication and Control
Towards insider threat detection using web server logs
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
SAX: a privacy preserving general pupose methodapplied to detection of intrusions
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
The intrusion detection model based on the fuzzy judgment in ad hoc network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Anomaly detection scheme using data mining in mobile environment
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A modular multiple classifier system for the detection of intrusions in computer networks
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
Agent-Based real time intrusion detection system against malformed packet attacks
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hi-index | 0.00 |
From the Publisher:The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise! Product selection, planning, and operations Filled with real-life cases and stories of intrusion detection systems in action Covers host-based and network-based intrusion detection Foreword by Dorothy Denning, author of Cryptography and Data Security and Information Warfare and Security Technical Edit by Ira Winkler, author of Corporate Espionage In The Practical Intrusion Detection Handbook, one of the field's leading experts shows exactly how to detect, deter, and respond to security threats using intrusion detection systems. Using real-world case studies and practical checklists, Paul E. Proctor shows what intrusion detection software can achieve, and how to integrate it into a comprehensive strategy for protecting information and e-commerce assets. No other guide to intrusion detection offers all this: Practical coverage of host-based, network-based, and hybrid solutions Detailed selection criteria and sample RFPs Key factors associated with successful deployment Intrusion detection in action: response, surveillance, damage assessment, data forensics, and beyond Six myths of intrusion detection and the realities Whether you're a senior IT decision-maker, system administrator, or infosecurity specialist, intrusion detection is a key weapon in your security arsenal. Now, there's a start-to-finish guide to making the most of it: The Practical Intrusion Detection Handbook by Paul E. Proctor. "Intrusion detection has gone from a theoretical concept to a practical solution, from a research dream to a major product area, from an idea worthy of study to a key element of the national plan for cyber defense. . . Nobody brought that about more than Paul Proctor. . . Paul brings his considerable knowledge and experience with commercial intrusion detection products to this first-of-a-kind book." From the Foreword by Dorothy Denning