Web Directory

  Research (22)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

See Also - Related Categories
Featured Websites in this category
http://www.raid-symposium.org/
Featured Site Recent Advances in Intrusion Detection Open in a new browser windowLink Details
- The RAID workshop series is an annual event dedicated to the sharing of information related to the intrusion-detection area.
- http://www.raid-symposium.org/

Lock this listing - So it can't be removed Report this listing Add a new Featured link

Regular Websites in this category

University of California Santa Barbara: Reliable Software Group Open in a new windowLink Details
- Works on languages and tools for designing, building, and validating software systems - with a focus on threat detection and analysis. Includes details of projects and staff profiles.
- http://www.cs.ucsb.edu/~rsg/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Common Intrusion Detection Framework (CIDF) Open in a new windowLink Details
- Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems.
- http://gost.isi.edu/cidf/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Minnesota Intrusion Detection System (MINDS) Open in a new windowLink Details
- Research project focused on the development of high-performance data mining algorithms and tools that will provide support required to analyze the massive data sets generated by various processes that monitor computing and information systems.
- http://www.cs.umn.edu/research/MINDS/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion Detection Analysis: A Case Study Open in a new windowLink Details
- A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network intrusion detection system.
- http://www.zeltser.com/intrusion-detection-analysis/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances) Open in a new windowLink Details
- SRI International's EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances) research project is a distributed scalable tool suite for tracking malicious activity through and across large networks.
- http://www.sdl.sri.com/projects/emerald/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Recent Advances in Intrusion Detection Symposium 2004 Open in a new windowLink Details
- International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with ESORICS 2004, September 15-17, 2004. The RAID International Symposium series is intended to advance the field of intrusion detection by promoting the exchange of
- http://raid04.eurecom.fr

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Thor Open in a new windowLink Details
- Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS.
- http://thor.cryptojail.net

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion detection articles Open in a new windowLink Details
- Selected articles and papers related to intrusion detection research.
- http://ids.homeunix.org/article.php

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
COAST Intrusion Detection Pages Open in a new windowLink Details
- Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools.
- http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
ResearchIndex, IDS section Open in a new windowLink Details
- ResearchIndex is a scientific literature digital library that aims to improve the dissemination and feedback of scientific literature, and to provide improvements in functionality, usability, availability, cost, comprehensiveness, efficiency, and timeline
- http://citeseer.ist.psu.edu/Security/IntrusionDetection/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Survivability Research and Analysis (CERT) Open in a new windowLink Details
- Research focuses on methods of improving the technical approach of identifying and preventing security flaws, limiting the damage from attacks, and ensuring that systems continue to provide essential services despite of compromises or failures.
- http://www.cert.org/nav/index_purple.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion Detection User Group Open in a new windowLink Details
- A group mailing focusing on security information management, intrusion response, intrusion detection, intrusion prevention, intrusion management and honeynets/honeypots.
- http://idug.cryptojail.net

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
System Design Laboratory Intrusion Detection Open in a new windowLink Details
- Research institute actively involved in intrusion-detection research since 1983. Research focuses on EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, a system designed to detect and respond to network attacks.
- http://www.sdl.sri.com/programs/intrusion/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
M-Correlator Open in a new windowLink Details
- A mission-impact-based approach to INFOSEC alarm correlation.
- http://www.sdl.sri.com/papers/mcorrelator/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion Detection Research Group(NCSU) Open in a new windowLink Details
- The Intrusion Detection (ID) Research Group at NC State University was formed by Dr. Peng Ning in August 2002.
- http://discovery.csc.ncsu.edu/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion detection projects at UC Davis Open in a new windowLink Details
- Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
- http://seclab.cs.ucdavis.edu/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Cost-sensitive intrusion detection(Georgia Institute of Technology) Open in a new windowLink Details
- A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
- http://www.cc.gatech.edu/~wenke/project/id.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Center for Secure and Dependable Software(University of Idaho) Open in a new windowLink Details
- Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.
- http://www.csds.uidaho.edu/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Computer immune systems (University of New Mexico) Open in a new windowLink Details
- Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for intentio
- http://www.cs.unm.edu/~immsec/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion Detection in Columbia University Open in a new windowLink Details
- This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to build
- http://www.cs.columbia.edu/ids/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Intrusion detection at the MIT Lincoln Lab, Information Systems Technology Group Open in a new windowLink Details
- Information Assurance focusing on techniques for detecting and reacting to intrusions into networked information systems. We have coordinated several evaluations of computer network intrusion detection systems.
- http://www.ll.mit.edu/IST/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]