Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: IDS (Page 9 of 10)   < Prev  4 5 6 7 8 9 10  Next >
Network Monitoring for Intrusion Detection
In the world of intrusion detection, we tend to focus on detecting attacks and clearly anomalous activity. However, another important component of a complete intrusion detection solution is basic network monitoring and traffic analysis. Network monitoring collects information on connections, while traffic analysis allows us to see what services are being used on a network and to compare that against the activity that we should be seeing. This allows us to identify unauthorized services being ...
By: Karen Kent Frederick 2001-08-28
http://www.securityfocus.com/infocus/1220

Intrusion Detection Preliminaries: Sanitizing Your E-Commerce Web Servers
By: Marc Myers 2000-03-31
http://www.securityfocus.com/infocus/1219

Hacker Tools and their Signatures, Part Two: Juno and Unisploit

By: Toby Miller 2001-06-18
http://www.securityfocus.com/infocus/1217

Deploying ISS RealSecure in a Large Scale Environment, Part Two: Manageability and Reporting
By: Richard Reybok 2000-04-26
http://www.securityfocus.com/infocus/1216

Deploying ISS Realsecure in a Large Scale Environment, Part One: Implementation Architecture
By: Richard Reybok 2000-04-17
http://www.securityfocus.com/infocus/1215

Intrusion Detection Systems Terminology, Part Two: H - Z

By: A. Cliff 2001-07-19
http://www.securityfocus.com/infocus/1214

Intrusion Detection Systems Terminology, Part One: A - H

By: A. Cliff 2001-07-03
http://www.securityfocus.com/infocus/1213

Network Intrusion Detection for the E-Commerce Environment
By: Eddie Powell 2000-07-10
http://www.securityfocus.com/infocus/1212

Intrusion Detection using Solaris' Basic Security Module
By: David Endler 2000-07-14
http://www.securityfocus.com/infocus/1211

Identifying ICMP Hackery Tools Used In The Wild Today
By: Ofir Arkin 2000-12-04
http://www.securityfocus.com/infocus/1210

IDS (Page 9 of 10)   < Prev  4 5 6 7 8 9 10  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus