141
click to vote
ACSAC
15 years 4 months ago
2003 IEEE
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
ACSAC
15 years 6 months ago
2003 IEEE
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
113
click to vote
ACSAC
15 years 4 months ago
2003 IEEE
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
ACSAC
15 years 6 months ago
2003 IEEE
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
|