Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: IDS (Page 8 of 10)   < Prev  3 4 5 6 7 8 9 10  Next >
Analysis of the T0rn Rootkit
By: Toby Miller 2000-11-29
http://www.securityfocus.com/infocus/1230

Social Engineering
By: Toby Miller 2000-06-19
http://www.securityfocus.com/infocus/1229

Hacker Tools and their Signatures, Part Three: Rootkits
By: Toby Miller 2001-08-14
http://www.securityfocus.com/infocus/1228

Intrusion Detection: Filling in the Gaps
By: Robert MacBride 2000-04-06
http://www.securityfocus.com/infocus/1227

Resynchronizing NIDS Systems
By: Eric Hacker 2000-09-22
http://www.securityfocus.com/infocus/1226

Intrusion Detection Level Analysis of Nmap and Queso
By: Toby Miller 2000-08-30
http://www.securityfocus.com/infocus/1225

Passive Fingerprinting
By: Lance Spitzner 2000-05-03
http://www.securityfocus.com/infocus/1224

Studying Normal Traffic, Part Three: TCP Headers

By: Karen Kent Frederick 2001-05-14
http://www.securityfocus.com/infocus/1223

Studying Normal Traffic, Part Two: Studying FTP Traffic

By: Karen Kent Frederick 2001-02-21
http://www.securityfocus.com/infocus/1222

Studying Normal Network Traffic, Part One

By: Karen Kent Frederick 2001-01-29
http://www.securityfocus.com/infocus/1221

IDS (Page 8 of 10)   < Prev  3 4 5 6 7 8 9 10  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus